RFC3869 日本語訳

3869 IAB Concerns and Recommendations Regarding Internet Research andEvolution. R. Atkinson, Ed., S. Floyd, Ed., Internet ArchitectureBoard. August 2004. (Format: TXT=78250 bytes) (Status: INFORMATIONAL)
プログラムでの自動翻訳です。
英語原文

Network Working Group                                   R. Atkinson, Ed.
Request for Comments: 3869                                 S. Floyd, Ed.
Category: Informational                      Internet Architecture Board
                                                             August 2004

ワーキンググループのR.アトキンソン、エドをネットワークでつないでください。コメントのために以下を要求してください。 3869秒間エドフロイド、カテゴリ: 情報のインターネット・アーキテクチャ委員会2004年8月

                    IAB Concerns and Recommendations
               Regarding Internet Research and Evolution

インターネット研究と発展に関するIAB心配と推薦

Status of this Memo

このMemoの状態

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

このメモはインターネットコミュニティのための情報を提供します。 それはどんな種類のインターネット標準も指定しません。 このメモの分配は無制限です。

Copyright Notice

版権情報

   Copyright (C) The Internet Society (2004).

Copyright(C)インターネット協会(2004)。

Abstract

要約

   This document discusses IAB concerns that ongoing research is needed
   to further the evolution of the Internet infrastructure, and that
   consistent, sufficient non-commercial funding is needed to enable
   such research.

このドキュメントは継続中の研究がインターネット基盤の発展を促進するのに必要であり、一貫して、十分な非営利的な基金がそのような研究を可能にするのに必要であるというIAB関心について議論します。

Table of Contents

目次

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2
       1.1.  Document Organization. . . . . . . . . . . . . . . . . .  2
       1.2.  IAB Concerns . . . . . . . . . . . . . . . . . . . . . .  3
       1.3.  Contributions to this Document . . . . . . . . . . . . .  4
   2.  History of Internet Research and Research Funding. . . . . . .  4
       2.1.  Prior to 1980. . . . . . . . . . . . . . . . . . . . . .  4
       2.2.  1980s and early 1990s. . . . . . . . . . . . . . . . . .  5
       2.3.  Mid-1990s to 2003. . . . . . . . . . . . . . . . . . . .  6
       2.4.  Current Status . . . . . . . . . . . . . . . . . . . . .  6
   3.  Open Internet Research Topics. . . . . . . . . . . . . . . . .  7
       3.1.  Scope and Limitations. . . . . . . . . . . . . . . . . .  7
       3.2.  Naming . . . . . . . . . . . . . . . . . . . . . . . . .  8
             3.2.1.   Domain Name System (DNS). . . . . . . . . . . .  8
             3.2.2.   New Namespaces. . . . . . . . . . . . . . . . .  9
       3.3.  Routing. . . . . . . . . . . . . . . . . . . . . . . . .  9
             3.3.1.   Inter-domain Routing. . . . . . . . . . . . . . 10
             3.3.2.   Routing Integrity . . . . . . . . . . . . . . . 11
             3.3.3.   Routing Algorithms. . . . . . . . . . . . . . . 12
             3.3.4.   Mobile and Ad-Hoc Routing . . . . . . . . . . . 13
       3.4.  Security . . . . . . . . . . . . . . . . . . . . . . . . 13

1. 序論. . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1。 組織を記録してください。 . . . . . . . . . . . . . . . . . 2 1.2. IABは.31.3に関係があります。 このDocument. . . . . . . . . . . . . 4 2への貢献。 インターネット研究と研究基金の歴史。 . . . . . . 4 2.1. 1980年前に。 . . . . . . . . . . . . . . . . . . . . . 4 2.2. 1980年代と早めの1990年代。 . . . . . . . . . . . . . . . . . 5 2.3. 2003への1990年代の半ば。 . . . . . . . . . . . . . . . . . . . 6 2.4. 現在の状態. . . . . . . . . . . . . . . . . . . . . 6 3。 インターネット研究話題を開いてください。 . . . . . . . . . . . . . . . . 7 3.1. 範囲と制限。 . . . . . . . . . . . . . . . . . 7 3.2. 命名. . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2.1。 ドメインネームシステム(DNS)。 . . . . . . . . . . . 8 3.2.2. 新しい名前空間。 . . . . . . . . . . . . . . . . 9 3.3. ルート設定。 . . . . . . . . . . . . . . . . . . . . . . . . 9 3.3.1. 相互ドメインルート設定。 . . . . . . . . . . . . . 10 3.3.2. 保全. . . . . . . . . . . . . . . 11 3.3.3を発送します。 ルーティング・アルゴリズム… 12 3.3 .4。 モバイルの、そして、臨時のルート設定. . . . . . . . . . . 13 3.4。 セキュリティ. . . . . . . . . . . . . . . . . . . . . . . . 13

Atkinson & Floyd             Informational                      [Page 1]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[1ページ]のRFC3869Research

             3.4.1.   Formal Methods. . . . . . . . . . . . . . . . . 14
             3.4.2.   Key Management. . . . . . . . . . . . . . . . . 14
             3.4.3.   Cryptography. . . . . . . . . . . . . . . . . . 15
             3.4.4.   Security for Distributed Computing. . . . . . . 15
             3.4.5.   Deployment Considerations in Security . . . . . 15
             3.4.6.   Denial of Service Protection. . . . . . . . . . 16
       3.5.  Network Management . . . . . . . . . . . . . . . . . . . 16
             3.5.1.   Managing Networks, Not Devices. . . . . . . . . 16
             3.5.2.   Enhanced Monitoring Capabilities. . . . . . . . 17
             3.5.3.   Customer Network Management . . . . . . . . . . 17
             3.5.4.   Autonomous Network Management . . . . . . . . . 17
       3.6.  Quality of Service . . . . . . . . . . . . . . . . . . . 17
             3.6.1.   Inter-Domain QoS Architecture . . . . . . . . . 18
             3.6.2.   New Queuing Disciplines . . . . . . . . . . . . 19
       3.7.  Congestion Control . . . . . . . . . . . . . . . . . . . 19
       3.8.  Studying the Evolution of the Internet Infrastructure. . 20
       3.9.  Middleboxes. . . . . . . . . . . . . . . . . . . . . . . 21
       3.10. Internet Measurement . . . . . . . . . . . . . . . . . . 21
       3.11. Applications . . . . . . . . . . . . . . . . . . . . . . 22
       3.12. Meeting the Needs of the Future. . . . . . . . . . . . . 22
       3.13. Freely Distributable Prototypes. . . . . . . . . . . . . 23
   4.  Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . 23
   5.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 23
   6.  Security Considerations. . . . . . . . . . . . . . . . . . . . 24
   7.  Informative References . . . . . . . . . . . . . . . . . . . . 24
   8.  Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 29
   9.  Full Copyright Statement . . . . . . . . . . . . . . . . . . . 30

3.4.1. 正式な方法。 . . . . . . . . . . . . . . . . 14 3.4.2. Key Management。 . . . . . . . . . . . . . . . . 14 3.4.3. 暗号。 . . . . . . . . . . . . . . . . . 15 3.4.4. 分散コンピューティングのためのセキュリティ。 . . . . . . 15 3.4.5. セキュリティ. . . . . 15 3.4.6における展開問題。 サービス妨害保護。 . . . . . . . . . 16 3.5. ネットワークマネージメント. . . . . . . . . . . . . . . . . . . 16 3.5.1。 装置ではなく、ネットワークを経営しています。 . . . . . . . . 16 3.5.2. モニターしている能力を高めました。 . . . . . . . 17 3.5.3. 顧客ネットワークマネージメント. . . . . . . . . . 17 3.5.4。 自動ネットワークマネージメント. . . . . . . . . 17 3.6。 サービスの質. . . . . . . . . . . . . . . . . . . 17 3.6.1。 相互ドメインQoS構造. . . . . . . . . 18 3.6.2。 新しい待ち行列の規律. . . . . . . . . . . . 19 3.7。 輻輳制御. . . . . . . . . . . . . . . . . . . 19 3.8。 インターネットインフラストラクチャの発展を研究します。 . 20 3.9. Middleboxes。 . . . . . . . . . . . . . . . . . . . . . . 21 3.10. インターネット測定. . . . . . . . . . . . . . . . . . 21 3.11。 アプリケーション. . . . . . . . . . . . . . . . . . . . . . 22 3.12。 未来の需要を満たします。 . . . . . . . . . . . . 22 3.13. 自由に配置可能な原型。 . . . . . . . . . . . . 23 4. 結論。 . . . . . . . . . . . . . . . . . . . . . . . . . 23 5. 承認. . . . . . . . . . . . . . . . . . . . . . . 23 6。 セキュリティ問題。 . . . . . . . . . . . . . . . . . . . 24 7. 有益な参照. . . . . . . . . . . . . . . . . . . . 24 8。 作者のアドレス. . . . . . . . . . . . . . . . . . . . . . 29 9。 完全な著作権宣言文. . . . . . . . . . . . . . . . . . . 30

1.  Introduction

1. 序論

   This document discusses the history of funding for Internet research,
   expresses concern about the current state of such funding, and
   outlines several specific areas that the IAB believes merit
   additional research.  Current funding levels for Internet research
   are not generally adequate, and several important research areas are
   significantly underfunded.  This situation needs to be rectified for
   the Internet to continue its evolution and development.

このドキュメントは、インターネット調査のための基金の歴史について議論して、そのような基金の現状頃に懸念を示して、IABが追加研究に値すると信じているいくつかの特定の領域について概説します。 一般に、インターネット調査のための現在の基金レベルは適切ではありません、そして、いくつかの重要な研究領域がかなり財源不足です。 この状況は、インターネットが進化と発生を続けるように正される必要があります。

1.1.  Document Organization

1.1. ドキュメント組織

   The first part of the document is a high-level discussion of the
   history of funding for Internet research to provide some historical
   context to this document.  The early funding of Internet research was
   largely from the U.S. government, followed by a period in the second
   half of the 1990s of commercial funding and of funding from several
   governments.  However, the commercial funding for Internet research
   has been reduced due to the recent economic downturn.

ドキュメントの最初の部分はインターネット調査が何らかの歴史的背景をこのドキュメントに供給する基金の歴史のハイレベルの議論です。 インターネット研究の早い基金は主に1990年代の後半の期間までに商業基金といくつかの政府からの基金について続かれる米国政府から来ていました。 しかしながら、インターネット調査のための商業基金は最近の景気の失速のため減少しました。

Atkinson & Floyd             Informational                      [Page 2]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[2ページ]のRFC3869Research

   The second part of the document provides an incomplete set of open
   Internet research topics.  These are only examples, intended to
   illustrate the breadth of open research topics.  This second section
   supports the general thesis that ongoing research is needed to
   further the evolution of the Internet infrastructure.  This includes
   research on the medium-time-scale evolution of the Internet
   infrastructure as well as research on longer-time-scale grand
   challenges.  This also includes many research issues that are already
   being actively investigated in the Internet research community.

ドキュメントの第二部は不完全なセットの開いているインターネット研究話題を提供します。 これらは開いている研究話題の幅を例証することを意図する例にすぎません。 セクションが一般的な論文を支えるこの秒に、その継続中の研究が、インターネット基盤の発展を促進するのに必要です。 これは、より長いタイムスケールの研究と同様にインターネット基盤の壮大な挑戦の中くらいのタイムスケール発展の研究を含んでいます。 また、これはインターネット研究団体で既に活発に調査されている多くの研究課題を含んでいます。

   Areas that are discussed in this section include the following:
   naming, routing, security, network management, and transport.  Issues
   that require more research also include more general architectural
   issues such as layering and communication between layers.  In
   addition, general topics discussed in this section include modeling,
   measurement, simulation, test-beds, etc.  We are focusing on topics
   that are related to the IETF and IRTF (Internet Research Task Force)
   agendas.  (For example, Grid issues are not discussed in this
   document because they are addressed through the Global Grid Forum and
   other Grid-specific organizations, not in the IETF.)

このセクションで議論する領域は以下を含んでいます: 命名、ルーティング、セキュリティ、ネットワークマネージメント、および輸送。 また、より多くの研究を必要とする問題が層の間のレイヤリングやコミュニケーションなどの、より一般的な構造的な問題を含んでいます。 さらに、このセクションで議論した一般的な話題はモデル、測定、シミュレーション、テストベッドなどを含んでいます。 私たちはIETFとIRTF(インターネットResearch Task Force)議題に関連する話題に焦点を合わせています。 (例えば、本書ではそれらがIETFで記述されるのではなく、Global Grid Forumと他のGrid特有の組織で記述されるので、Grid問題について議論しません。)

   Where possible, the examples in this document point to separate
   documents on these issues, and only give a high-level summary of the
   issues raised in those documents.

可能であるところに、例は、これらの問題で本書では別々のドキュメントを示して、それらのドキュメントで提起された問題のハイレベルの概要をするだけです。

1.2.  IAB Concerns

1.2. IAB関心

   In the aftermath of September 11 2001, there seems to be a renewed
   interest by governments in funding research for Internet-related
   security issues.  From [Jackson02]: "It is generally agreed that the
   security and reliability of the basic protocols underlying the
   Internet have not received enough attention because no one has a
   proprietary interest in them".

2001年9月11日の余波では、政府による更新された関心はインターネット関連の安全保障問題のための基金研究であるように思えます。 [Jackson02]から: 「一般に、だれも独占関心をそれらに持っていないのでインターネットの基礎となる基本プロトコルのセキュリティと信頼性が十分な配慮を受けていないのに同意されます。」

   That quote brings out a key issue in funding for Internet research,
   which is that because no single organization (e.g., no single
   government, software company, equipment vendor, or network operator)
   has a sense of ownership of the global Internet infrastructure,
   research on the general issues of the Internet infrastructure are
   often not adequately funded.  In our current challenging economic
   climate, it is not surprising that commercial funding sources are
   more likely to fund that research that leads to a direct competitive
   advantage.

その引用文はインターネット調査のための基金における主要な問題を発行します。(それは、どんな単純組織(例えば、単一の政府でない、ソフトウェア会社でない、設備業者でない、またはネットワーク・オペレータがない)もそうしていないのでしばしば適切に世界的なインターネットインフラストラクチャの所有権の感覚、インターネット基盤の一般答弁の研究に資金を供給するというわけではないということです)。 私たちの現在のやりがいがある経済情勢では、商業資金源がダイレクト競争力において有利な立場につながるその研究により資金を供給しそうであるのは、驚くべきものではありません。

   The principal thesis of this document is that if commercial funding
   is the main source of funding for future Internet research, the
   future of the Internet infrastructure could be in trouble.  In
   addition to issues about which projects are funded, the funding

このドキュメントの主要な論文はインターネット基盤の未来が商業基金が今後のインターネット調査のための基金の主な源であるなら、困るかもしれないということです。 プロジェクトがどれであるかに関して資金を供給された問題、基金に加えて

Atkinson & Floyd             Informational                      [Page 3]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[3ページ]のRFC3869Research

   source can also affect the content of the research, for example,
   towards or against the development of open standards, or taking
   varying degrees of care about the effect of the developed protocols
   on the other traffic on the Internet.

また、ソースは、例えば、取るか、オープンスタンダードの開発、またはインターネットにおけるもう片方の交通への開発されたプロトコルの効果に関して注意して異なった度について取らないように研究の内容に影響できます。

   At the same time, many significant research contributions in
   networking have come from commercial funding.  However, for most of
   the topics in this document, relying solely on commercially-funded
   research would not be adequate.  Much of today's commercial funding
   is focused on technology transition, taking results from non-
   commercial research and putting them into shipping commercial
   products.  We have not tried to delve into each of the research
   issues below to discuss, for each issue, what are the potentials and
   limitations of commercial funding for research in that area.

同時に、ネットワークにおける多くの重要な研究貢献が商業基金から来ました。 しかしながら、このドキュメントの話題の大部分のために唯一商業的に資金を供給された研究に依存するのは適切でないでしょう。 今日の商業基金の多くが技術変遷に焦点を合わせられます、非市場調査から結果を取って、商品を出荷するのにそれらを入れて。 私たちは、各問題のためにその領域で何が調査のために資金を供給するコマーシャルの可能性と制限であるかと議論するために以下のそれぞれの研究課題を調べようとしませんでした。

   On a more practical note, if there was no commercial funding for
   Internet research, then few research projects would be taken to
   completion with implementations, deployment, and follow-up
   evaluation.

より実際的な雰囲気では、インターネット調査のための商業基金がなければ、実現、展開、および追跡している評価でわずかな研究計画しか完成に取らないでしょうに。

   While it is theoretically possible for there to be too much funding
   for Internet research, that is far from the current problem.  There
   is also much that could be done within the network research community
   to make Internet research more focused and productive, but that would
   belong in a separate document.

そこには、インターネット調査のためのあまりに多くの基金であることが理論的に可能ですが、それは現在の問題から遠いです。 さらにインターネット研究に焦点を合わせさせるネットワーク研究団体の中でしていて生産的であるかもしれませんが、別々のドキュメントにはある多くもあります。

1.3.  Contributions to this Document

1.3. このDocumentへの貢献

   A number of people have directly contributed text for this document,
   even though, following current conventions, the official RFC author
   list includes only the key editors of the document.  The
   Acknowledgements section at the end of the document thanks other
   people who contributed to this document in some form.

多くの人々がこのドキュメントのために直接テキストを寄付しました、現在のコンベンションに続いて、公式のRFC作者リストはドキュメントの主要なエディタだけを含んでいますが。 ドキュメントの端のAcknowledgements部は何らかのフォームでこのドキュメントに貢献した他の人々に感謝します。

2.  History of Internet Research and Research Funding

2. インターネット研究と研究基金の歴史

2.1.  Prior to 1980

2.1. 1980年前に

   Most of the early research into packet-switched networks was
   sponsored by the U.S. Defense Advanced Research Projects Agency
   (DARPA) [CSTB99].  This includes the initial design, implementation,
   and deployment of the ARPAnet connecting several universities and
   other DARPA contractors.  The ARPAnet originally came online in the
   late 1960s.  It grew in size during the 1970s, still chiefly with
   DARPA funding, and demonstrated the utility of packet-switched
   networking.

パケット交換網の早めの研究の大部分は国防総省防衛先端技術研究計画局(DARPA)[CSTB99]によって後援されました。 これはいくつかの大学と他のDARPA契約者に接するARPAnetの初期のデザイン、実現、および展開を含んでいます。 ARPAnetは元々、オンラインで1960年代後半に入りました。 それは、1970年代の間、まだ主としてDARPA基金に応じてサイズで成長して、パケットで切り換えられたネットワークに関するユーティリティを実施説明しました。

Atkinson & Floyd             Informational                      [Page 4]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[4ページ]のRFC3869Research

   DARPA funding for Internet design started in 1973, just four years
   after the initial ARPAnet deployment.  The support for Internet
   design was one result of prior DARPA funding for packet radio and
   packet satellite research.  The existence of multiple networks
   (ARPAnet, packet radio, and packet satellite) drove the need for
   internetworking research.  The Internet arose in large measure as a
   consequence of DARPA research funding for these three networks -- and
   arise only incidentally from the commercially-funded work at Xerox
   PARC on Ethernet.

インターネットデザインのためのDARPA基金は初期のARPAnet展開のちょうど4年後に1973年に始まりました。 インターネットデザインのサポートはパケットラジオのための先のDARPA基金とパケット衛星研究の1つの結果でした。 複数のネットワーク(ARPAnet、パケットラジオ、およびパケット衛星)の存在はインターネットワーキング調査の必要性を追い立てました。 インターネットはこれらの3つのネットワークのためのDARPA研究基金の結果としてよほど起こりました--そして、偶然にだけ、商業的に資金を供給された仕事から、イーサネットにゼロックスPARCに起こります。

2.2.  1980s and early 1990s

2.2. 1980年代と早めの1990年代

   The ARPAnet converted to the Internet Protocol (IP) on January 1,
   1983, approximately 20 years before this document was written.
   Throughout the 1980s, the U.S. Government continued strong research
   and development funding for Internet technology.  DARPA continued to
   be the key funding source, but was supplemented by other DoD (U.S.
   Department of Defense) funding (e.g., via the Defense Data Network
   (DDN) program of the Defense Communication Agency (DCA)) and other
   U.S. Government funding (e.g., U.S. Department of Energy (DoE)
   funding for research networks at DoE national laboratories, (U.S.)
   National Science Foundation (NSF) funding for academic institutions).
   This funding included basic research, applied research (including
   freely distributable prototypes), the purchase of IP-capable
   products, and operating support for the IP-based government networks
   such as ARPAnet, ESnet, MILnet, the NASA Science Internet, and
   NSFnet.

このドキュメントが書かれているおよそ20年前にARPAnetは1983年1月1日にインターネットプロトコル(IP)に変えました。 1980年代の間中、米国政府はインターネット技術のための強い研究開発基金を続けていました。 DARPAはずっと主要な資金源ですが、他のDoD(米国国防総省)基金(例えば、防衛通信委員会(DCA)に関するDefense Data Network(DDN)プログラムを通した)と他の米国によって補われました。政府基金(例えば、DoEの国家の実験室の研究ネットワークのための米国エネルギー省(DoE)基金、アカデミックな団体のための(米国)科学基金(NSF)基金)。 この基金の含まれている基礎研究、応用研究(自由に配置可能な原型を含んでいる)、IPできる製品の購買、およびIPを拠点とする政府の操作サポートはARPAnet、ESnetなどのようにNASAのMILnet、Scienceインターネット、およびNSFnetをネットワークでつなぎます。

   During the 1980s, the U.S. DoD desired to leave the business of
   providing operational network services to academic institutions, so
   funding for most academic activities moved over to the NSF during the
   decade.  NSF's initial work included sponsorship of CSnet in 1981.
   By 1986, NSF was also sponsoring various research projects into
   networking (e.g., Mills' work on Fuzzballs).  In the late 1980s, NSF
   created the NSFnet backbone and sponsored the creation of several NSF
   regional networks (e.g., SURAnet) and interconnections with several
   international research networks.  NSF also funded gigabit networking
   research, through the Corporation for National Research Initiatives
   (CNRI), starting in the late 1980s.  It is important to note that the
   NSF sponsorship was focused on achieving core NSF goals, such as
   connecting scientists at leading universities to NSF supercomputing
   centers.  The needs of high-performance remote access to
   supercomputers drove the overall NSFnet performance.  As a side
   effect, this meant that students and faculty at those universities
   enjoyed a relatively high-performance Internet environment.  As those
   students graduated, they drove both commercial use of the Internet
   and the nascent residential market.  It is no accident that this was
   the environment from which the world wide web emerged.

1980年代の間、米国DoDが、アカデミックな団体への操作上のネットワーク・サービスを提供するビジネスを出ることを望んでいたので、ほとんどの研究活動のための基金は10年間NSFに譲られました。 NSFの初期の仕事は1981年にCSnetのスポンサーシップを含んでいました。 また、1986年までには、NSFは(例えば、Fuzzballsへのミルズの作業)をネットワークでつなぐのに様々な研究計画を後援していました。 1980年代後半に、NSFはNSFnet背骨を作成して、いくつかの国際的な研究ネットワークと共にいくつかのNSF地域ネットワーク(例えば、SURAnet)とインタコネクトの創造を後援しました。 また、NSFはNational Research Initiatives(CNRI)のために社を通して1980年代後半からギガビットネットワーク研究に資金を供給しました。 NSFスポンサーシップがコアNSF目標を達成するのに焦点を合わせられたことに注意するのは重要です、一流大学でNSFスーパーコンピューティングセンターに科学者に接するのなどように。 スーパーコンピュータへの高性能遠隔アクセスの必要性は総合的なNSFnet性能を追い立てました。 副作用として、これは、それらの大学の学生と教授陣が比較的高い性能のインターネット環境を楽しんだことを意味しました。 それらの学生が卒業したとき、彼らはインターネットの商用利用と初期の住宅物件市場の両方を運転しました。 これが世界的なウェブが出て来た環境であったのは事故ではありません。

Atkinson & Floyd             Informational                      [Page 5]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[5ページ]のRFC3869Research

   Most research funding outside the U.S. during the 1980s and early
   1990s was focused on the ISO OSI networking project or on then-new
   forms of network media (e.g., wireless, broadband access).  The
   European Union was a significant source of research funding for the
   networking community in Europe during this period.  Some of the best
   early work in gigabit networking was undertaken in the UK and Sweden.

1980年代と1990年代前半の間の米国の外のほとんどの研究基金がISO OSIネットワークプロジェクト、または、次に、新しいフォームのネットワークメディア(例えば、無線の、そして、広帯域のアクセス)に焦点を合わせられました。 この期間、ヨーロッパ連合はヨーロッパのネットワーク共同体への研究基金の重要な源でした。 いくらかのギガビットネットワークで最も良い早めの仕事がイギリスとスウェーデンで引き受けられました。

2.3.  Mid-1990s to 2003

2.3. 2003への1990年代の半ば

   Starting in the middle 1990s, U.S. Government funding for Internet
   research and development was significantly reduced.  The premise for
   this was that the growing Internet industry would pay for whatever
   research and development that was needed.  Some funding for Internet
   research and development has continued in this period from European
   and Asian organizations (e.g., the WIDE Project in Japan [WIDE]).
   Reseaux IP Europeens [RIPE] is an example of market-funded networking
   research in Europe during this period.

中央1990年代から、インターネット研究開発のための米国政府基金はかなり減少しました。 これのための前提による増加しているインターネット産業が必要であったどんな研究開発も代価を払うだろうということでした。 インターネット研究開発のためのいくつかの基金がヨーロッパの、そして、アジアの組織(例えば、日本[WIDE]のWIDE Project)からのこの時代に続きました。 Reseaux IP Europeens[RIPE]はこの期間のヨーロッパでの市場によって資金を供給されたネットワーク研究に関する例です。

   Experience during this period has been that commercial firms have
   often focused on donating equipment to academic institutions and
   promoting somewhat vocationally-focused educational projects.  Many
   of the commercially-funded research and development projects appear
   to have been selected because they appeared likely to give the
   funding source a specific short-term economic advantage over its
   competitors.  Higher risk, more innovative research proposals
   generally have not been funded by industry.  A common view in Silicon
   Valley has been that established commercial firms are not very good
   at transitioning cutting edge research into products, but were
   instead good at buying small startup firms who had successfully
   transitioned such cutting edge research into products.
   Unfortunately, small startup companies are generally unable
   financially to fund any research themselves.

この期間の経験は商社がしばしばアカデミックな団体に設備を寄贈して、職業上にいくらか集中している教育プロジェクトを促進するのは焦点を合わせたということです。 商業的に資金を供給された研究と開発計画の多くが競争相手より特定の短期的な経済利点が資金源に与えられそうだったので選択されたように見えます。 一般に、より高いリスク、より革新的な研究提案は産業によって資金を供給されていません。 シリコンバレーの共通認識は設立された商社が製品の移行の最先端の研究がそれほど上手でないということですが、製品の中に代わりに首尾よく移行した小さい始動会社にそのような最先端の研究を買うのが上手であるのがありますか? 残念ながら、一般に、小さい新興企業は財政上自分たちでどんな研究にも資金を供給することができません。

2.4.  Current Status

2.4. 現在の状態

   The result of reduced U.S. Government funding and profit-focused,
   low-risk, short-term industry funding has been a decline in higher-
   risk but more innovative research activities.  Industry has also been
   less interested in research to evolve the overall Internet
   architecture, because such work does not translate into a competitive
   advantage for the firm funding such work.

減少している米国政府基金、および利益で集中していて、低リスクの、そして、短期的な産業基金の結果は、より高いリスクにもかかわらず、より革新的な研究活動の衰退です。 また、産業はそれほど総合的なインターネット構造を研究に発展したがっていませんでした、そのような仕事がそのような仕事に資金を供給する会社のために競争力において有利な立場に翻訳されないので。

   The IAB believes that it would be helpful for governments and other
   non-commercial sponsors to increase their funding of both basic
   research and applied research relating to the Internet, and to
   sustain these funding levels going forward.

IABは、政府と他の非営利的なスポンサーが彼らのインターネットに関連する基礎研究と応用研究の両方の基金を増加させて、進んでいるこれらの基金レベルを支えるのに役立っていると信じています。

Atkinson & Floyd             Informational                      [Page 6]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[6ページ]のRFC3869Research

3.  Open Internet Research Topics

3. 開いているインターネット研究話題

   This section primarily discusses some specific topics that the IAB
   believes merit additional research.  Research, of course, includes
   not just devising a theory, algorithm, or mechanism to accomplish a
   goal, but also evaluating the general efficacy of the approach and
   then the benefits vs. the costs of deploying that algorithm or
   mechanism.  Important cautionary notes about this discussion are
   given in the next sub-section.  This particular set of topics is not
   intended to be comprehensive, but instead is intended to demonstrate
   the breadth of open Internet research questions.

このセクションは主としてIABが追加研究に値すると信じているいくつかの特定の話題について論じます。 研究は、もちろんそのアルゴリズムかメカニズムを配備するコストに対して目標を達成するために理論、アルゴリズム、またはメカニズムについて工夫するだけではなく、アプローチの一般的な効力を評価して、次に、利益を評価もするのを含んでいます。 次の小区分でこの議論に関する重要な警告的な注を与えます。 この特定のセットの話題は、包括的であることを意図しませんが、未解決のインターネット研究質問の幅を示すことを代わりに意図します。

   Other discussions of problems of the Internet that merit further
   research include the following:
   [CIPB02,Claffy03a,Floyd,NSF03a,NSF03b].

さらなる研究に値するインターネットの問題の他の議論は以下を含んでいます: [CIPB02、Claffy03a、フロイド、NSF03a、NSF03b。]

3.1.  Scope and Limitations

3.1. 範囲と制限

   This document is NOT intended as a guide for public funding agencies
   as to exactly which projects or proposals should or should not be
   funded.

提案に資金を供給するべきであるか、公的資金代理店のガイドとしてまさにどのプロジェクトに関してこのドキュメントを意図しないべきでないか、そして、資金を供給するべきではありません。

   In particular, this document is NOT intended to be a comprehensive
   list of *all* of the research questions that are important to further
   the evolution of the Internet; that would be a daunting task, and
   would presuppose a wider and more intensive effort than we have
   undertaken in this document.

特に、このドキュメントは*に関する総覧がすべて、インターネットの発展を促進するために重要な研究質問の*であったなら意図しません。 それは、困難な仕事であるだろう、私たちが本書では引き受けたよりさらに広くて徹底的な努力を予想するでしょう。

   Similarly, this document is not intended to list the research
   questions that are judged to be only of peripheral importance, or to
   survey the current (global; governmental, commercial, and academic)
   avenues for funding for Internet research, or to make specific
   recommendations about which areas need additional funding.  The
   purpose of the document is to persuade the reader that ongoing
   research is needed towards the continued evolution of the Internet
   infrastructure; the purpose is not to make binding pronouncements
   about which specific areas are and are not worthy of future funding.

同様に、このドキュメントが周囲の重要性しかないか、または電流について調査すると判断される研究質問を記載することを意図しない、(グローバル;、政府、アカデミー会員) コマーシャル、およびインターネット調査か特定の推薦状をする基金のための領域が追加融資がそうしなければならない大通り ドキュメントの目的は継続中の研究がインターネット基盤の継続的進化に向かって必要であると読者を説得することです。 目的は将来の基金にふさわしくない特定の領域があって、関する拘束力がある宣告をしないことです。

   For some research clearly relevant to the future evolution of the
   Internet, there are grand controversies between competing proposals
   or competing schools of thought; it is not the purpose of this
   document to take positions in these controversies, or to take
   positions on the nature of the solutions for areas needing further
   research.

明確にインターネットの今後の発展に関連している何らかの調査のために、考えの競争している提案か競合校の間には、壮大な論争があります。 それはさらなる研究を必要とする領域の解決策の本質のこれらの論争における立場を取るか、または立場を取るこのドキュメントの目的ではありません。

Atkinson & Floyd             Informational                      [Page 7]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[7ページ]のRFC3869Research

   That all carefully noted, the remainder of this section discusses a
   broad set of research areas, noting a subset of particular topics of
   interest in each of those research areas.  Again, this list is NOT
   comprehensive, but rather is intended to suggest that a broad range
   of ongoing research is needed, and to propose some candidate topics.

このセクションの残りは広い研究領域について議論します、それが慎重にすべて注意されてそれぞれのそれらの研究領域で興味がある特定の話題の部分集合に注意して。 一方、このリストは、包括的ではありませんが、広範囲な継続中の研究が必要であることを示して、いくつかの候補話題を提案することをむしろ意図します。

3.1.1.  Terminology

3.1.1. 用語

   Several places in this document refer to 'network operators'.  By
   that term, we intend to include anyone or any organization that
   operates an IP-based network; we are not using that term in the
   narrow meaning of commercial network service providers.

処々方々は本書では'ネットワーク・オペレータ'について言及します。 その用語までには、私たちはIP接続を基本にしたネットワークを運用するだれかどんな組織も含むつもりです。 私たちは商業ネットワークサービスプロバイダーの狭い意味でその用語を使用していません。

3.2.  Naming

3.2. 命名

   The Internet currently has several different namespaces, including IP
   addresses, sockets (specified by the IP address, upper-layer
   protocol, and upper-layer port number), Autonomous System (AS)
   number, and the Fully-Qualified Domain Name (FQDN).  Many of the
   Internet's namespaces are supported by the widely deployed Domain
   Name System [RFC-3467] or by various Internet applications [RFC-2407,
   Section 4.6.2.1]

インターネットには、現在、いくつかの異なった名前空間があります、IPアドレス、ソケット(IPアドレス、上側の層のプロトコル、および上側の層のポートナンバーで、指定される)、Autonomous System(AS)番号、およびFullyが適切なDomain Name(FQDN)を含んでいて。 インターネットの名前空間の多くが広く配備されたドメインネームシステム[RFC-3467]か様々なインターネットアプリケーションで支持されます。[RFC-2407、セクション4.6.2、.1]

3.2.1.  Domain Name System (DNS)

3.2.1. ドメインネームシステム(DNS)

   The DNS system, while it works well given its current constraints,
   has several stress points.

DNSシステムには、現在の規制を考えて、うまくいきますが、数個の圧力ポイントがあります。

   The current DNS system relies on UDP for transport, rather than SCTP
   or TCP.  Given the very large number of clients using a typical DNS
   server, it is desirable to minimize the state on the DNS server side
   of the connection.  UDP does this well, so it is a reasonable choice,
   though this has other implications, for example a reliance on UDP
   fragmentation.  With IPv6, intermediate fragmentation is not allowed
   and Path MTU Discovery is mandated.  However, the amount of state
   required to deploy Path MTU Discovery for IPv6 on a DNS server might
   be a significant practical problem.

現在のDNSシステムはSCTPかTCPよりむしろ輸送のためにUDPを当てにします。 典型的なDNSサーバを使用している多くのクライアントを考えて、接続のDNSサーバ側面の状態を最小にするのは望ましいです。 UDPがこの井戸をするので、それは正当な選択です、これには、他の意味がありますが、例えば、UDP断片化への信用。 IPv6と共に、中間的断片化は許されていません、そして、Path MTUディスカバリーは強制されます。 しかしながら、IPv6のためにDNSサーバでPath MTUディスカバリーを配備しなければならなかった状態の量は重要な実用的な問題であるかもしれません。

   One implication of this is that research into alternative transport
   protocols, designed more for DNS-like applications where there are
   very many clients using each server, might be useful.  Of particular
   interest would be transport protocols with little burden for the DNS
   server, even if that increased the burden somewhat for the DNS
   client.

この1つの含意は非常に多くのクライアントがいるDNSのようなアプリケーションのために各サーバを使用することでさらに設計された代替のトランスポート・プロトコルの研究が役に立つかもしれないということです。 特別の関心はDNSサーバのための小さい負担があるトランスポート・プロトコルでしょう、それがいくらかDNSクライアントのために負担を増加させたとしても。

   Additional study of DNS caching, both currently available caching
   techniques and also of potential new caching techniques, might be
   helpful in finding ways to reduce the offered load for a typical DNS

現在DNSキャッシュ、利用可能なキャッシュのテクニック、および潜在的新しいキャッシュのテクニックについても追加研究は典型的なDNSのために提供された負荷を減少させる方法を見つける際に役立っているかもしれません。

Atkinson & Floyd             Informational                      [Page 8]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[8ページ]のRFC3869Research

   server.  In particular, examination of DNS caching through typical
   commercial firewalls might be interesting if it lead to alternative
   firewall implementations that were less of an obstacle to DNS
   caching.

サーバ障害でDNSキャッシュにより少なかった代替のファイアウォール実現に通じるなら、典型的な商業ファイアウォールを通したDNSキャッシュの試験は特に、おもしろいかもしれません。

   The community lacks a widely-agreed-upon set of metrics for measuring
   DNS server performance.  It would be helpful if people would
   seriously consider what characteristics of the DNS system should be
   measured.

共同体は測定DNSサーバ性能のための広く同意されたセットの測定基準を欠いています。 人々が、DNSシステムのどんな特性が測定されるべきであるかを真剣に考えれば、助かるでしょう。

   Some in the community would advocate replacing the current DNS system
   with something better.  Past attempts to devise a better approach
   have not yielded results that persuaded the community to change.
   Proposed work in this area could be very useful, but might require
   careful scrutiny to avoid falling into historic design pitfalls.

共同体の或るものは、現在のDNSシステムを何かより良いものに取り替えると提唱するでしょう。 より良いアプローチについて工夫する過去の試みは変化するように共同体を説得した結果をもたらしていません。 この領域での提案された仕事は、非常に役に立つかもしれませんが、歴史的なデザイン落とし穴になるのを避けるために慎重な精査を必要とするかもしれません。

   With regards to DNS security, major technical concerns include
   finding practical methods for signing very large DNS zones (e.g., and
   tools to make it easier to manage secure DNS infrastructure.

DNSセキュリティへの尊敬で、主要な技術的な関心が、非常に大きいDNSゾーンにサインするための実用的方法を見つけるのを含んでいる、(例えば、そして、安全なDNSインフラストラクチャを管理するのをより簡単にするツール。

   Most users are unable to distinguish a DNS-related failure from a
   more general network failure.  Hence, maintaining the integrity and
   availability of the Domain Name System is very important for the
   future health of the Internet.

ほとんどのユーザは、より一般的なネットワーク失敗とDNS関連の失敗を区別できません。 したがって、インターネットの将来の健康に、ドメインネームシステムの保全と有用性を維持するのは非常に重要です。

3.2.2.  New Namespaces

3.2.2. 新しい名前空間

   Additionally, the Namespace Research Group (NSRG) of the Internet
   Research Task Force (IRTF) studied adding one or more additional
   namespaces to the Internet Architecture [LD2002].  Many members of
   the IRTF NSRG believe that there would be significant architectural
   benefit to adding one or more additional namespaces to the Internet
   Architecture.  Because smooth consensus on that question or on the
   properties of a new namespace was not obtained, the IRTF NSRG did not
   make a formal recommendation to the IETF community regarding
   namespaces.  The IAB believes that this is an open research question
   worth examining further.

さらに、インターネットResearch Task Force(IRTF)のNamespace Research Group(NSRG)は、インターネットArchitecture[LD2002]に1つ以上の追加名前空間を加えながら、研究しました。 IRTF NSRGの多くのメンバーが、1つ以上の追加名前空間をインターネットArchitectureに加えることへの重要な建築利益があると信じています。 その質問か新しい名前空間の所有地に関する滑らかなコンセンサスが得られなかったので、IRTF NSRGは名前空間に関して正式な推薦状をIETF共同体にしませんでした。 IABは、これがさらに調べる価値がある未解決の研究質問であると信じています。

   Finally, we believe that future research into the evolution of
   Internet-based distributed computing might well benefit from studying
   adding additional namespaces as part of a new approach to distributed
   computing.

最終的に、私たちは、インターネットを利用する分散コンピューティングの発展の今後の研究がたぶん分散コンピューティングへの新しいアプローチの一部として追加名前空間を加えながら研究の利益を得るだろうと信じています。

3.3.  Routing

3.3. ルート設定

   The currently deployed unicast routing system works reasonably well
   for most users.  However, the current unicast routing architecture is
   suboptimal in several areas, including the following: end-to-end

現在配備されたユニキャストルーティングシステムはほとんどのユーザに合理的にうまくいきます。 しかしながら、現在のユニキャストルーティング建築は以下を含むいくつかの領域で準最適です: 終わるには、終わってください。

Atkinson & Floyd             Informational                      [Page 9]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[9ページ]のRFC3869Research

   convergence times in global-scale catenets (a system of networks
   interconnected via gateways); the ability of the existing inter-
   domain path-vector algorithm to scale well beyond 200K prefixes; the
   ability of both intra-domain and inter-domain routing to use multiple
   metrics and multiple kinds of metrics concurrently; and the ability
   of IPv4 and IPv6 to support widespread site multi-homing without
   undue adverse impact on the inter-domain routing system.  Integrating
   policy into routing is also a general concern, both for intra-domain
   and inter-domain routing.  In many cases, routing policy is directly
   tied to economic issues for the network operators, so applied
   research into routing ideally would consider economic considerations
   as well as technical considerations.

convergence times in global-scale catenets (a system of networks interconnected via gateways); the ability of the existing inter- domain path-vector algorithm to scale well beyond 200K prefixes; the ability of both intra-domain and inter-domain routing to use multiple metrics and multiple kinds of metrics concurrently; and the ability of IPv4 and IPv6 to support widespread site multi-homing without undue adverse impact on the inter-domain routing system. Integrating policy into routing is also a general concern, both for intra-domain and inter-domain routing. In many cases, routing policy is directly tied to economic issues for the network operators, so applied research into routing ideally would consider economic considerations as well as technical considerations.

   This is an issue for which the commercial interest is clear, but that
   seems unlikely to be solved through commercial funding for research,
   in the absence of a consortium of some type.

This is an issue for which the commercial interest is clear, but that seems unlikely to be solved through commercial funding for research, in the absence of a consortium of some type.

3.3.1.  Inter-domain Routing

3.3.1. Inter-domain Routing

   The current operational inter-domain routing system has between
   150,000 and 200,000 routing prefixes in the default-free zone (DFZ)
   [RFC-3221].  ASIC technology obviates concerns about the ability to
   forward packets at very high speeds.  ASIC technology also obviates
   concerns about the time required to perform longest-prefix-match
   computations.  However, some senior members of the Internet routing
   community have concerns that the end-to-end convergence properties of
   the global Internet might hit fundamental algorithmic limitations
   (i.e., not hardware limitations) when the DFZ is somewhere between
   200,000 and 300,000 prefixes.  Research into whether this concern is
   well-founded in scientific terms seems very timely.

The current operational inter-domain routing system has between 150,000 and 200,000 routing prefixes in the default-free zone (DFZ) [RFC-3221]. ASIC technology obviates concerns about the ability to forward packets at very high speeds. ASIC technology also obviates concerns about the time required to perform longest-prefix-match computations. However, some senior members of the Internet routing community have concerns that the end-to-end convergence properties of the global Internet might hit fundamental algorithmic limitations (i.e., not hardware limitations) when the DFZ is somewhere between 200,000 and 300,000 prefixes. Research into whether this concern is well-founded in scientific terms seems very timely.

   Separately from the above concern, recent work has shown that there
   can be significant BGP convergence issues today.  At present, it
   appears that the currently observed convergence issues relate to how
   BGP has been configured by network operators, rather than being any
   sort of fundamental algorithmic limitation [MGVK02].  This
   convergence time issue makes the duration of the apparent network
   outage much longer than it should be.  Additional applied research
   into which aspects of a BGP configuration have the strongest impact
   on convergence times would help mitigate the currently observed
   operational issues.

Separately from the above concern, recent work has shown that there can be significant BGP convergence issues today. At present, it appears that the currently observed convergence issues relate to how BGP has been configured by network operators, rather than being any sort of fundamental algorithmic limitation [MGVK02]. This convergence time issue makes the duration of the apparent network outage much longer than it should be. Additional applied research into which aspects of a BGP configuration have the strongest impact on convergence times would help mitigate the currently observed operational issues.

   Also, inter-domain routing currently requires significant human
   engineering of specific inter-AS paths to ensure that reasonably
   optimal paths are used by actual traffic.  Ideally, the inter-domain
   routing system would automatically cause reasonably optimal paths to
   be chosen.  Recent work indicates that improved BGP policy mechanisms

Also, inter-domain routing currently requires significant human engineering of specific inter-AS paths to ensure that reasonably optimal paths are used by actual traffic. Ideally, the inter-domain routing system would automatically cause reasonably optimal paths to be chosen. Recent work indicates that improved BGP policy mechanisms

Atkinson & Floyd             Informational                     [Page 10]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 10] RFC 3869 Research Funding Recommendations August 2004

   might help ensure that reasonably optimal paths are normally used for
   inter-domain IP traffic.  [SMA03]  Continued applied research in this
   area might lead to substantially better technical approaches.

might help ensure that reasonably optimal paths are normally used for inter-domain IP traffic. [SMA03] Continued applied research in this area might lead to substantially better technical approaches.

   The current approach to site multi-homing has the highly undesirable
   side-effect of significantly increasing the growth rate of prefix
   entries in the DFZ (by impairing the deployment of prefix
   aggregation).  Research is needed into new routing architectures that
   can support large-scale site multi-homing without the undesirable
   impacts on inter-domain routing of the current multi-homing
   technique.

The current approach to site multi-homing has the highly undesirable side-effect of significantly increasing the growth rate of prefix entries in the DFZ (by impairing the deployment of prefix aggregation). Research is needed into new routing architectures that can support large-scale site multi-homing without the undesirable impacts on inter-domain routing of the current multi-homing technique.

   The original application for BGP was in inter-domain routing,
   primarily within service provider networks but also with some use by
   multi-homed sites.  However, some are now trying to use BGP in other
   contexts, for example highly mobile environments, where it is less
   obviously well suited.  Research into inter-domain routing and/or
   intra-domain policy routing might lead to other approaches for any
   emerging environments where the current BGP approach is not the
   optimal one.

The original application for BGP was in inter-domain routing, primarily within service provider networks but also with some use by multi-homed sites. However, some are now trying to use BGP in other contexts, for example highly mobile environments, where it is less obviously well suited. Research into inter-domain routing and/or intra-domain policy routing might lead to other approaches for any emerging environments where the current BGP approach is not the optimal one.

3.3.2.  Routing Integrity

3.3.2. Routing Integrity

   Recently there has been increased awareness of the longstanding issue
   of deploying strong authentication into the Internet inter-domain
   routing system.  Currently deployed mechanisms (e.g., BGP TCP MD5
   [RFC-2385], OSPF MD5, RIP MD5 [RFC-2082]) provide cryptographic
   authentication of routing protocol messages, but no authentication of
   the actual routing data.  Recent proposals (e.g., S-BGP [KLMS2000])
   for improving this in inter-domain routing appear difficult to deploy
   across the Internet, in part because of their reliance on a single
   trust hierarchy (e.g., a single PKI).  Similar proposals (e.g., OSPF
   with Digital Signatures, [RFC-2154]) for intra-domain routing are
   argued to be computationally infeasible to deploy in a large network.

Recently there has been increased awareness of the longstanding issue of deploying strong authentication into the Internet inter-domain routing system. Currently deployed mechanisms (e.g., BGP TCP MD5 [RFC-2385], OSPF MD5, RIP MD5 [RFC-2082]) provide cryptographic authentication of routing protocol messages, but no authentication of the actual routing data. Recent proposals (e.g., S-BGP [KLMS2000]) for improving this in inter-domain routing appear difficult to deploy across the Internet, in part because of their reliance on a single trust hierarchy (e.g., a single PKI). Similar proposals (e.g., OSPF with Digital Signatures, [RFC-2154]) for intra-domain routing are argued to be computationally infeasible to deploy in a large network.

   A recurring challenge with any form of inter-domain routing
   authentication is that there is no single completely accurate source
   of truth about which organizations have the authority to advertise
   which address blocks.  Alternative approaches to authentication of
   data in the routing system need to be developed.  In particular, the
   ability to perform partial authentication of routing data would
   facilitate incremental deployment of routing authentication
   mechanisms.  Also, the ability to use non-hierarchical trust models
   (e.g., the web of trust used in the PGP application) might facilitate
   incremental deployment and might resolve existing concerns about
   centralized administration of the routing system, hence it merits
   additional study and consideration.

A recurring challenge with any form of inter-domain routing authentication is that there is no single completely accurate source of truth about which organizations have the authority to advertise which address blocks. Alternative approaches to authentication of data in the routing system need to be developed. In particular, the ability to perform partial authentication of routing data would facilitate incremental deployment of routing authentication mechanisms. Also, the ability to use non-hierarchical trust models (e.g., the web of trust used in the PGP application) might facilitate incremental deployment and might resolve existing concerns about centralized administration of the routing system, hence it merits additional study and consideration.

Atkinson & Floyd             Informational                     [Page 11]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 11] RFC 3869 Research Funding Recommendations August 2004

3.3.3.  Routing Algorithms

3.3.3. Routing Algorithms

   The current Internet routing system relies primarily on two
   algorithms.  Link-state routing uses the Dijkstra algorithm
   [Dijkstra59].  Distance-Vector routing (e.g., RIP) and Path-Vector
   routing (e.g., BGP) use the Bellman-Ford algorithm [Bellman1957,
   FF1962].  Additional ongoing basic research into graph theory as
   applied to routing is worthwhile and might yield algorithms that
   would enable a new routing architecture or otherwise provide
   improvements to the routing system.

The current Internet routing system relies primarily on two algorithms. Link-state routing uses the Dijkstra algorithm [Dijkstra59]. Distance-Vector routing (e.g., RIP) and Path-Vector routing (e.g., BGP) use the Bellman-Ford algorithm [Bellman1957, FF1962]. Additional ongoing basic research into graph theory as applied to routing is worthwhile and might yield algorithms that would enable a new routing architecture or otherwise provide improvements to the routing system.

   Currently deployed multicast routing relies on the Deering RPF
   algorithm [Deering1988].  Ongoing research into alternative multicast
   routing algorithms and protocols might help alleviate current
   concerns with the scalability of multicast routing.

Currently deployed multicast routing relies on the Deering RPF algorithm [Deering1988]. Ongoing research into alternative multicast routing algorithms and protocols might help alleviate current concerns with the scalability of multicast routing.

   The deployed Internet routing system assumes that the shortest path
   is always the best path.  This is provably false, however it is a
   reasonable compromise given the routing protocols currently
   available.  The Internet lacks deployable approaches for policy-based
   routing or routing with alternative metrics (i.e., some metric other
   than the number of hops to the destination).  Examples of alternative
   policies include: the path with lowest monetary cost; the path with
   the lowest probability of packet loss; the path with minimized
   jitter; and the path with minimized latency.  Policy metrics also
   need to take business relationships into account.  Historic work on
   QoS-based routing has tended to be unsuccessful in part because it
   did not adequately consider economic and commercial considerations of
   the routing system and in part because of inadequate consideration of
   security implications.

The deployed Internet routing system assumes that the shortest path is always the best path. This is provably false, however it is a reasonable compromise given the routing protocols currently available. The Internet lacks deployable approaches for policy-based routing or routing with alternative metrics (i.e., some metric other than the number of hops to the destination). Examples of alternative policies include: the path with lowest monetary cost; the path with the lowest probability of packet loss; the path with minimized jitter; and the path with minimized latency. Policy metrics also need to take business relationships into account. Historic work on QoS-based routing has tended to be unsuccessful in part because it did not adequately consider economic and commercial considerations of the routing system and in part because of inadequate consideration of security implications.

   Transitioning from the current inter-domain routing system to any new
   inter-domain routing system is unlikely to be a trivial exercise.  So
   any proposal for a new routing system needs to carefully consider and
   document deployment strategies, transition mechanisms, and other
   operational considerations.  Because of the cross-domain
   interoperability aspect of inter-domain routing, smooth transitions
   from one inter-domain routing system are likely to be difficult to
   accomplish.  Separately, the inter-domain routing system lacks strong
   market forces that would encourage migration to better technical
   approaches.  Hence, it appears unlikely that the commercial sector
   will be the source of a significantly improved inter-domain routing
   system.

Transitioning from the current inter-domain routing system to any new inter-domain routing system is unlikely to be a trivial exercise. So any proposal for a new routing system needs to carefully consider and document deployment strategies, transition mechanisms, and other operational considerations. Because of the cross-domain interoperability aspect of inter-domain routing, smooth transitions from one inter-domain routing system are likely to be difficult to accomplish. Separately, the inter-domain routing system lacks strong market forces that would encourage migration to better technical approaches. Hence, it appears unlikely that the commercial sector will be the source of a significantly improved inter-domain routing system.

Atkinson & Floyd             Informational                     [Page 12]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 12] RFC 3869 Research Funding Recommendations August 2004

3.3.4.  Mobile and Ad-Hoc Routing

3.3.4. Mobile and Ad-Hoc Routing

   While some of the earliest DARPA-sponsored networking research
   involved packet radio networks, mobile routing [IM1993] and mobile
   ad-hoc routing [RFC-2501] are relatively recent arrivals in the
   Internet, and are not yet widely deployed.  The current approaches
   are not the last word in either of those arenas.  We believe that
   additional research into routing support for mobile hosts and mobile
   networks is needed.  Additional research for ad-hoc mobile hosts and
   mobile networks is also worthwhile.  Ideally, mobile routing and
   mobile ad-hoc routing capabilities should be native inherent
   capabilities of the Internet routing architecture.  This probably
   will require a significant evolution from the existing Internet
   routing architecture.  (NB: The term "mobility" as used here is not
   limited to mobile telephones, but instead is very broadly defined,
   including laptops that people carry, cars/trains/aircraft, and so
   forth.)

While some of the earliest DARPA-sponsored networking research involved packet radio networks, mobile routing [IM1993] and mobile ad-hoc routing [RFC-2501] are relatively recent arrivals in the Internet, and are not yet widely deployed. The current approaches are not the last word in either of those arenas. We believe that additional research into routing support for mobile hosts and mobile networks is needed. Additional research for ad-hoc mobile hosts and mobile networks is also worthwhile. Ideally, mobile routing and mobile ad-hoc routing capabilities should be native inherent capabilities of the Internet routing architecture. This probably will require a significant evolution from the existing Internet routing architecture. (NB: The term "mobility" as used here is not limited to mobile telephones, but instead is very broadly defined, including laptops that people carry, cars/trains/aircraft, and so forth.)

   Included in this topic are a wide variety of issues.  The more
   distributed and dynamic nature of partially or completely self-
   organizing routing systems (including the associated end nodes)
   creates unique security challenges (especially relating to
   Authorization, Authentication, and Accounting, and relating to key
   management).  Scalability of wireless networks can be difficult to
   measure or to achieve.  Enforced hierarchy is one approach, but can
   be very limiting.  Alternative, less constraining approaches to
   wireless scalability are desired.  Because wireless link-layer
   protocols usually have some knowledge of current link characteristics
   such as link quality, sublayer congestion conditions, or transient
   channel behavior, it is desirable to find ways to let network-layer
   routing use such data.  This raises architectural questions of what
   the proper layering should be, which functions should be in which
   layer, and also practical considerations of how and when such
   information sharing should occur in real implementations.

Included in this topic are a wide variety of issues. The more distributed and dynamic nature of partially or completely self- organizing routing systems (including the associated end nodes) creates unique security challenges (especially relating to Authorization, Authentication, and Accounting, and relating to key management). Scalability of wireless networks can be difficult to measure or to achieve. Enforced hierarchy is one approach, but can be very limiting. Alternative, less constraining approaches to wireless scalability are desired. Because wireless link-layer protocols usually have some knowledge of current link characteristics such as link quality, sublayer congestion conditions, or transient channel behavior, it is desirable to find ways to let network-layer routing use such data. This raises architectural questions of what the proper layering should be, which functions should be in which layer, and also practical considerations of how and when such information sharing should occur in real implementations.

3.4.  Security

3.4. Security

   The Internet has a reputation for not having sufficient security.  In
   fact, the Internet has a number of security mechanisms standardized,
   some of which are widely deployed.  However, there are a number of
   open research questions relating to Internet security.  In
   particular, security mechanisms need to be incrementally deployable
   and easy to use.  "[Security] technology must be easy to use, or it
   will not be configured correctly.  If mis-configured, security will
   be lost, but things will `work'" [Schiller03].

The Internet has a reputation for not having sufficient security. In fact, the Internet has a number of security mechanisms standardized, some of which are widely deployed. However, there are a number of open research questions relating to Internet security. In particular, security mechanisms need to be incrementally deployable and easy to use. "[Security] technology must be easy to use, or it will not be configured correctly. If mis-configured, security will be lost, but things will `work'" [Schiller03].

Atkinson & Floyd             Informational                     [Page 13]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 13] RFC 3869 Research Funding Recommendations August 2004

3.4.1.  Formal Methods

3.4.1. Formal Methods

   There is an ongoing need for funding of basic research relating to
   Internet security, including funding of formal methods research that
   relates to security algorithms, protocols, and systems.

There is an ongoing need for funding of basic research relating to Internet security, including funding of formal methods research that relates to security algorithms, protocols, and systems.

   For example, it would be beneficial to have more formal study of
   non-hierarchical trust models (e.g., PGP's Web-of-Trust model).  Use
   of a hierarchical trust model can create significant limitations in
   how one might approach securing components of the Internet, for
   example the inter-domain routing system.  So research to develop new
   trust models suited for the Internet or on the applicability of
   existing non-hierarchical trust models to existing Internet problems
   would be worthwhile.

For example, it would be beneficial to have more formal study of non-hierarchical trust models (e.g., PGP's Web-of-Trust model). Use of a hierarchical trust model can create significant limitations in how one might approach securing components of the Internet, for example the inter-domain routing system. So research to develop new trust models suited for the Internet or on the applicability of existing non-hierarchical trust models to existing Internet problems would be worthwhile.

   While there has been some work on the application of formal methods
   to cryptographic algorithms and cryptographic protocols, existing
   techniques for formal evaluation of algorithms and protocols lack
   sufficient automation.  This lack of automation means that many
   protocols aren't formally evaluated in a timely manner.  This is
   problematic for the Internet because formal evaluation has often
   uncovered serious anomalies in cryptographic protocols.  The creation
   of automated tools for applying formal methods to cryptographic
   algorithms and/or protocols would be very helpful.

While there has been some work on the application of formal methods to cryptographic algorithms and cryptographic protocols, existing techniques for formal evaluation of algorithms and protocols lack sufficient automation. This lack of automation means that many protocols aren't formally evaluated in a timely manner. This is problematic for the Internet because formal evaluation has often uncovered serious anomalies in cryptographic protocols. The creation of automated tools for applying formal methods to cryptographic algorithms and/or protocols would be very helpful.

3.4.2.  Key Management

3.4.2. Key Management

   A recurring challenge to the Internet community is how to design,
   implement, and deploy key management appropriate to the myriad of
   security contexts existing in the global Internet.  Most current work
   in unicast key management has focused on hierarchical trust models,
   because much of the existing work has been driven by corporate or
   military "top-down" operating models.

A recurring challenge to the Internet community is how to design, implement, and deploy key management appropriate to the myriad of security contexts existing in the global Internet. Most current work in unicast key management has focused on hierarchical trust models, because much of the existing work has been driven by corporate or military "top-down" operating models.

   The paucity of key management methods applicable to non-hierarchical
   trust models (see above) is a significant constraint on the
   approaches that might be taken to secure components of the Internet.

The paucity of key management methods applicable to non-hierarchical trust models (see above) is a significant constraint on the approaches that might be taken to secure components of the Internet.

   Research focused on removing those constraints by developing
   practical key management methods applicable to non-hierarchical trust
   models would be very helpful.

Research focused on removing those constraints by developing practical key management methods applicable to non-hierarchical trust models would be very helpful.

   Topics worthy of additional research include key management
   techniques, such as non-hierarchical key management architectures
   (e.g., to support non-hierarchical trust models; see above), that are
   useful by ad-hoc groups in mobile networks and/or distributed
   computing.

Topics worthy of additional research include key management techniques, such as non-hierarchical key management architectures (e.g., to support non-hierarchical trust models; see above), that are useful by ad-hoc groups in mobile networks and/or distributed computing.

Atkinson & Floyd             Informational                     [Page 14]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 14] RFC 3869 Research Funding Recommendations August 2004

   Although some progress has been made in recent years, scalable
   multicast key management is far from being a solved problem.
   Existing approaches to scalable multicast key management add
   significant constraints on the problem scope in order to come up with
   a deployable technical solution.  Having a more general approach to
   scalable multicast key management (i.e., one having broader
   applicability and fewer constraints) would enhance the Internet's
   capabilities.

Although some progress has been made in recent years, scalable multicast key management is far from being a solved problem. Existing approaches to scalable multicast key management add significant constraints on the problem scope in order to come up with a deployable technical solution. Having a more general approach to scalable multicast key management (i.e., one having broader applicability and fewer constraints) would enhance the Internet's capabilities.

   In many cases, attribute negotiation is an important capability of a
   key management protocol.  Experience with the Internet Key Exchange
   (IKE) to date has been that it is unduly complex.  Much of IKE's
   complexity derives from its very general attribute negotiation
   capabilities.  A new key management approach that supported
   significant attribute negotiation without creating challenging levels
   of deployment and operations complexity would be helpful.

In many cases, attribute negotiation is an important capability of a key management protocol. Experience with the Internet Key Exchange (IKE) to date has been that it is unduly complex. Much of IKE's complexity derives from its very general attribute negotiation capabilities. A new key management approach that supported significant attribute negotiation without creating challenging levels of deployment and operations complexity would be helpful.

3.4.3.  Cryptography

3.4.3. Cryptography

   There is an ongoing need to continue the open-world research funding
   into both cryptography and cryptanalysis.  Most governments focus
   their cryptographic research in the military-sector.  While this is
   understandable, those efforts often have limited (or no) publications
   in the open literature.  Since the Internet engineering community
   must work from the open literature, it is important that open-world
   research continues in the future.

There is an ongoing need to continue the open-world research funding into both cryptography and cryptanalysis. Most governments focus their cryptographic research in the military-sector. While this is understandable, those efforts often have limited (or no) publications in the open literature. Since the Internet engineering community must work from the open literature, it is important that open-world research continues in the future.

3.4.4.  Security for Distributed Computing

3.4.4. Security for Distributed Computing

   MIT's Project Athena was an important and broadly successful research
   project into distributed computing.  Project Athena developed the
   Kerberos [RFC-1510] security system, which has significant deployment
   today in campus environments.  However, inter-realm Kerberos is
   neither as widely deployed nor perceived as widely successful as
   single-realm Kerberos.  The need for scalable inter-domain user
   authentication is increasingly acute as ad-hoc computing and mobile
   computing become more widely deployed.  Thus, work on scalable
   mechanisms for mobile, ad-hoc, and non-hierarchical inter-domain
   authentication would be very helpful.

MIT's Project Athena was an important and broadly successful research project into distributed computing. Project Athena developed the Kerberos [RFC-1510] security system, which has significant deployment today in campus environments. However, inter-realm Kerberos is neither as widely deployed nor perceived as widely successful as single-realm Kerberos. The need for scalable inter-domain user authentication is increasingly acute as ad-hoc computing and mobile computing become more widely deployed. Thus, work on scalable mechanisms for mobile, ad-hoc, and non-hierarchical inter-domain authentication would be very helpful.

3.4.5.  Deployment Considerations in Security

3.4.5. Deployment Considerations in Security

   Lots of work has been done on theoretically perfect security that is
   impossible to deploy.  Unfortunately, the S-BGP proposal is an
   example of a good research product that has significant unresolved
   deployment challenges.  It is far from obvious how one could widely
   deploy S-BGP without previously deploying a large-scale inter-domain
   public-key infrastructure and also centralizing route advertisement

Lots of work has been done on theoretically perfect security that is impossible to deploy. Unfortunately, the S-BGP proposal is an example of a good research product that has significant unresolved deployment challenges. It is far from obvious how one could widely deploy S-BGP without previously deploying a large-scale inter-domain public-key infrastructure and also centralizing route advertisement

Atkinson & Floyd             Informational                     [Page 15]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 15] RFC 3869 Research Funding Recommendations August 2004

   policy enforcement in the Routing Information Registries or some
   similar body.  Historically, public-key infrastructures have been
   either very difficult or impossible to deploy at large scale.
   Security mechanisms that need additional infrastructure have not been
   deployed well.  We desperately need security that is general, easy to
   install, and easy to manage.

policy enforcement in the Routing Information Registries or some similar body. Historically, public-key infrastructures have been either very difficult or impossible to deploy at large scale. Security mechanisms that need additional infrastructure have not been deployed well. We desperately need security that is general, easy to install, and easy to manage.

3.4.6.  Denial of Service Protection

3.4.6. Denial of Service Protection

   Historically, the Internet community has mostly ignored pure Denial
   of Service (DoS) attacks.  This was appropriate at one time since
   such attacks were rare and are hard to defend against.  However, one
   of the recent trends in adversarial software (e.g., viruses, worms)
   has been the incorporation of features that turn the infected host
   into a "zombie".  Such zombies can be remotely controlled to mount a
   distributed denial of service attack on some victim machine.  In many
   cases, the authorized operators of systems are not aware that some or
   all of their systems have become zombies.  It appears that the
   presence of non-trivial numbers of zombies in the global Internet is
   now endemic, which makes distributed denial of service attacks a much
   larger concern.  So Internet threat models need to assume the
   presence of such zombies in significant numbers.  This makes the
   design of protocols resilient in the presence of distributed denial
   of service attacks very important to the health of the Internet.
   Some work has been done on this front [Savage00], [MBFIPS01], but
   more is needed.

Historically, the Internet community has mostly ignored pure Denial of Service (DoS) attacks. This was appropriate at one time since such attacks were rare and are hard to defend against. However, one of the recent trends in adversarial software (e.g., viruses, worms) has been the incorporation of features that turn the infected host into a "zombie". Such zombies can be remotely controlled to mount a distributed denial of service attack on some victim machine. In many cases, the authorized operators of systems are not aware that some or all of their systems have become zombies. It appears that the presence of non-trivial numbers of zombies in the global Internet is now endemic, which makes distributed denial of service attacks a much larger concern. So Internet threat models need to assume the presence of such zombies in significant numbers. This makes the design of protocols resilient in the presence of distributed denial of service attacks very important to the health of the Internet. Some work has been done on this front [Savage00], [MBFIPS01], but more is needed.

3.5.  Network Management

3.5. Network Management

   The Internet had early success in network device monitoring with the
   Simple Network Management Protocol (SNMP) and its associated
   Management Information Base (MIB).  There has been comparatively less
   success in managing networks, in contrast to the monitoring of
   individual devices.  Furthermore, there are a number of operator
   requirements not well supported by the current Internet management
   framework.  It is desirable to enhance the current Internet network
   management architecture to more fully support operational needs.

The Internet had early success in network device monitoring with the Simple Network Management Protocol (SNMP) and its associated Management Information Base (MIB). There has been comparatively less success in managing networks, in contrast to the monitoring of individual devices. Furthermore, there are a number of operator requirements not well supported by the current Internet management framework. It is desirable to enhance the current Internet network management architecture to more fully support operational needs.

   Unfortunately, network management research has historically been very
   underfunded.  Operators have complained that existing solutions are
   inadequate.  Research is needed to find better solutions.

Unfortunately, network management research has historically been very underfunded. Operators have complained that existing solutions are inadequate. Research is needed to find better solutions.

3.5.1.  Managing Networks, Not Devices

3.5.1. Managing Networks, Not Devices

   At present there are few or no good tools for managing a whole
   network instead of isolated devices.  For example, the lack of
   appropriate network management tools has been cited as one of the
   major barriers to the widespread deployment of IP multicast [Diot00,

At present there are few or no good tools for managing a whole network instead of isolated devices. For example, the lack of appropriate network management tools has been cited as one of the major barriers to the widespread deployment of IP multicast [Diot00,

Atkinson & Floyd             Informational                     [Page 16]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 16] RFC 3869 Research Funding Recommendations August 2004

   SM03].  Current network management protocols, such as the Simple
   Network Management Protocol (SNMP), are fine for reading status of
   well-defined objects from individual boxes.  Managing networks
   instead of isolated devices requires the ability to view the network
   as a large distributed system.  Research is needed on scalable
   distributed data aggregation mechanisms, scalable distributed event
   correlation mechanisms, and distributed and dependable control
   mechanisms.

SM03]. Current network management protocols, such as the Simple Network Management Protocol (SNMP), are fine for reading status of well-defined objects from individual boxes. Managing networks instead of isolated devices requires the ability to view the network as a large distributed system. Research is needed on scalable distributed data aggregation mechanisms, scalable distributed event correlation mechanisms, and distributed and dependable control mechanisms.

   Applied research into methods of managing sets of networked devices
   seems worthwhile.  Ideally, such a management approach would support
   distributed management, rather than being strictly centralized.

Applied research into methods of managing sets of networked devices seems worthwhile. Ideally, such a management approach would support distributed management, rather than being strictly centralized.

3.5.2.  Enhanced Monitoring Capabilities

3.5.2. Enhanced Monitoring Capabilities

   SNMP does not always scale well to monitoring large numbers of
   objects in many devices in different parts of the network.  An
   alternative approach worth exploring is how to provide scalable and
   distributed monitoring, not on individual devices, but instead on
   groups of devices and the network-as-a-whole.  This requires scalable
   techniques for data aggregation and event correlation of network
   status data originating from numerous locations in the network.

SNMP does not always scale well to monitoring large numbers of objects in many devices in different parts of the network. An alternative approach worth exploring is how to provide scalable and distributed monitoring, not on individual devices, but instead on groups of devices and the network-as-a-whole. This requires scalable techniques for data aggregation and event correlation of network status data originating from numerous locations in the network.

3.5.3.  Customer Network Management

3.5.3. Customer Network Management

   An open issue related to network management is helping users and
   others to identify and resolve problems in the network.  If a user
   can't access a web page, it would be useful if the user could find
   out, easily, without having to run ping and traceroute, whether the
   problem was that the web server was down, that the network was
   partitioned due to a link failure, that there was heavy congestion
   along the path, that the DNS name couldn't be resolved, that the
   firewall prohibited the access, or that some other specific event
   occurred.

An open issue related to network management is helping users and others to identify and resolve problems in the network. If a user can't access a web page, it would be useful if the user could find out, easily, without having to run ping and traceroute, whether the problem was that the web server was down, that the network was partitioned due to a link failure, that there was heavy congestion along the path, that the DNS name couldn't be resolved, that the firewall prohibited the access, or that some other specific event occurred.

3.5.4.  Autonomous Network Management

3.5.4. Autonomous Network Management

   More research is needed to improve the degree of automation achieved
   by network management systems and to localize management.  Autonomous
   network management might involve the application of control theory,
   artificial intelligence or expert system technologies to network
   management problems.

More research is needed to improve the degree of automation achieved by network management systems and to localize management. Autonomous network management might involve the application of control theory, artificial intelligence or expert system technologies to network management problems.

3.6.  Quality of Service

3.6. Quality of Service

   There has been an intensive body of research and development work on
   adding QoS to the Internet architecture for more than ten years now
   [RFC-1633, RFC-2474, RFC-3260, RFC-2205, RFC-2210], yet we still

There has been an intensive body of research and development work on adding QoS to the Internet architecture for more than ten years now [RFC-1633, RFC-2474, RFC-3260, RFC-2205, RFC-2210], yet we still

Atkinson & Floyd             Informational                     [Page 17]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 17] RFC 3869 Research Funding Recommendations August 2004

   don't have end-to-end QoS in the Internet [RFC-2990, RFC-3387].  The
   IETF is good at defining individual QoS mechanisms, but poor at work
   on deployable QoS architectures.  Thus, while Differentiated Services
   (DiffServ) mechanisms have been standardized as per-hop behaviors,
   there is still much to be learned about the deployment of that or
   other QoS mechanisms for end-to-end QoS.  In addition to work on
   purely technical issues, this includes close attention to the
   economic models and deployment strategies that would enable an
   increased deployment of QoS in the network.

don't have end-to-end QoS in the Internet [RFC-2990, RFC-3387]. The IETF is good at defining individual QoS mechanisms, but poor at work on deployable QoS architectures. Thus, while Differentiated Services (DiffServ) mechanisms have been standardized as per-hop behaviors, there is still much to be learned about the deployment of that or other QoS mechanisms for end-to-end QoS. In addition to work on purely technical issues, this includes close attention to the economic models and deployment strategies that would enable an increased deployment of QoS in the network.

   In many cases, deployment of QoS mechanisms would significantly
   increase operational security risks [RFC-2990], so any new research
   on QoS mechanisms or architectures ought to specifically discuss the
   potential security issues associated with the new proposal(s) and how
   to mitigate those security issues.

In many cases, deployment of QoS mechanisms would significantly increase operational security risks [RFC-2990], so any new research on QoS mechanisms or architectures ought to specifically discuss the potential security issues associated with the new proposal(s) and how to mitigate those security issues.

   In some cases, the demand for QoS mechanisms has been diminished by
   the development of more resilient voice/video coding techniques that
   are better suited for the best-effort Internet than the older coding
   techniques that were originally designed for circuit-switched
   networks.

In some cases, the demand for QoS mechanisms has been diminished by the development of more resilient voice/video coding techniques that are better suited for the best-effort Internet than the older coding techniques that were originally designed for circuit-switched networks.

   One of the factors that has blunted the demand for QoS has been the
   transition of the Internet infrastructure from heavy congestion in
   the early 1990s, to overprovisioning in backbones and in many
   international links now.  Thus, research in QoS mechanisms also has
   to include some careful attention to the relative costs and benefits
   of QoS in different places in the network.  Applied research into QoS
   should include explicit consideration of economic issues of deploying
   and operating a QoS-enabled IP network [Clark02].

One of the factors that has blunted the demand for QoS has been the transition of the Internet infrastructure from heavy congestion in the early 1990s, to overprovisioning in backbones and in many international links now. Thus, research in QoS mechanisms also has to include some careful attention to the relative costs and benefits of QoS in different places in the network. Applied research into QoS should include explicit consideration of economic issues of deploying and operating a QoS-enabled IP network [Clark02].

3.6.1.  Inter-Domain QoS Architecture

3.6.1. Inter-Domain QoS Architecture

   Typically, a router in the deployed inter-domain Internet provides
   best-effort forwarding of IP packets, without regard for whether the
   source or destination of the packet is a direct customer of the
   operator of the router.  This property is a significant contributor
   to the current scalability of the global Internet and contributes to
   the difficulty of deploying inter-domain Quality of Service (QoS)
   mechanisms.

Typically, a router in the deployed inter-domain Internet provides best-effort forwarding of IP packets, without regard for whether the source or destination of the packet is a direct customer of the operator of the router. This property is a significant contributor to the current scalability of the global Internet and contributes to the difficulty of deploying inter-domain Quality of Service (QoS) mechanisms.

   Deploying existing Quality-of-Service (QoS) mechanisms, for example
   Differentiated Services or Integrated Services, across an inter-
   domain boundary creates a significant and easily exploited denial-of-
   service vulnerability for any network that provides inter-domain QoS
   support.  This has caused network operators to refrain from
   supporting inter-domain QoS.  The Internet would benefit from

Deploying existing Quality-of-Service (QoS) mechanisms, for example Differentiated Services or Integrated Services, across an inter- domain boundary creates a significant and easily exploited denial-of- service vulnerability for any network that provides inter-domain QoS support. This has caused network operators to refrain from supporting inter-domain QoS. The Internet would benefit from

Atkinson & Floyd             Informational                     [Page 18]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 18] RFC 3869 Research Funding Recommendations August 2004

   additional research into alternative approaches to QoS, particularly
   into approaches that do not create such vulnerabilities and can be
   deployed end-to-end [RFC-2990].

additional research into alternative approaches to QoS, particularly into approaches that do not create such vulnerabilities and can be deployed end-to-end [RFC-2990].

   Also, current business models are not consistent with inter-domain
   QoS, in large part because it is impractical or impossible to
   authenticate the identity of the sender of would-be preferred traffic
   while still forwarding traffic at line-rate.  Absent such an ability,
   it is unclear how a network operator could bill or otherwise recover
   costs associated with providing that preferred service.  So any new
   work on inter-domain QoS mechanisms and architectures needs to
   carefully consider the economic and security implications of such
   proposals.

Also, current business models are not consistent with inter-domain QoS, in large part because it is impractical or impossible to authenticate the identity of the sender of would-be preferred traffic while still forwarding traffic at line-rate. Absent such an ability, it is unclear how a network operator could bill or otherwise recover costs associated with providing that preferred service. So any new work on inter-domain QoS mechanisms and architectures needs to carefully consider the economic and security implications of such proposals.

3.6.2.  New Queuing Disciplines

3.6.2. New Queuing Disciplines

   The overall Quality-of-Service for traffic is in part determined by
   the scheduling and queue management mechanisms at the routers.  While
   there are a number of existing mechanisms (e.g., RED) that work well,
   it is possible that improved active queuing strategies might be
   devised.  Mechanisms that lowered the implementation cost in IP
   routers might help increase deployment of active queue management,
   for example.

The overall Quality-of-Service for traffic is in part determined by the scheduling and queue management mechanisms at the routers. While there are a number of existing mechanisms (e.g., RED) that work well, it is possible that improved active queuing strategies might be devised. Mechanisms that lowered the implementation cost in IP routers might help increase deployment of active queue management, for example.

3.7.  Congestion Control.

3.7. Congestion Control.

   TCP's congestion avoidance and control mechanisms, from 1988
   [Jacobson88], have been a key factor in maintaining the stability of
   the Internet, and are used by the bulk of the Internet's traffic.
   However, the congestion control mechanisms of the Internet need to be
   expanded and modified to meet a wide range of new requirements, from
   new applications such as streaming media and multicast to new
   environments such as wireless networks or very high bandwidth paths,
   and new requirements for minimizing queueing delay.  While there are
   significant bodies of work in several of these issues, considerably
   more needs to be done.

TCP's congestion avoidance and control mechanisms, from 1988 [Jacobson88], have been a key factor in maintaining the stability of the Internet, and are used by the bulk of the Internet's traffic. However, the congestion control mechanisms of the Internet need to be expanded and modified to meet a wide range of new requirements, from new applications such as streaming media and multicast to new environments such as wireless networks or very high bandwidth paths, and new requirements for minimizing queueing delay. While there are significant bodies of work in several of these issues, considerably more needs to be done.

   We would note that research on TCP congestion control is also not yet
   "done", with much still to be accomplished in high-speed TCP, or in
   adding robust performance over paths with significant reordering,
   intermittent connectivity, non-congestive packet loss, and the like.

We would note that research on TCP congestion control is also not yet "done", with much still to be accomplished in high-speed TCP, or in adding robust performance over paths with significant reordering, intermittent connectivity, non-congestive packet loss, and the like.

   Several of these issues bring up difficult fundamental questions
   about the potential costs and benefits of increased communication
   between layers.  Would it help transport to receive hints or other
   information from routing, from link layers, or from other transport-
   level connections?  If so, what would be the cost to robust operation
   across diverse environments?

Several of these issues bring up difficult fundamental questions about the potential costs and benefits of increased communication between layers. Would it help transport to receive hints or other information from routing, from link layers, or from other transport- level connections? If so, what would be the cost to robust operation across diverse environments?

Atkinson & Floyd             Informational                     [Page 19]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 19] RFC 3869 Research Funding Recommendations August 2004

   For congestion control mechanisms in routers, active queue management
   and Explicit Congestion Notification are generally not yet deployed,
   and there are a range of proposals, in various states of maturity, in
   this area.  At the same time, there is a great deal that we still do
   not understand about the interactions of queue management mechanisms
   with other factors in the network.  Router-based congestion control
   mechanisms are also needed for detecting and responding to aggregate
   congestion such as in Distributed Denial of Service attacks and flash
   crowds.

For congestion control mechanisms in routers, active queue management and Explicit Congestion Notification are generally not yet deployed, and there are a range of proposals, in various states of maturity, in this area. At the same time, there is a great deal that we still do not understand about the interactions of queue management mechanisms with other factors in the network. Router-based congestion control mechanisms are also needed for detecting and responding to aggregate congestion such as in Distributed Denial of Service attacks and flash crowds.

   As more applications have the need to transfer very large files over
   high delay-bandwidth-product paths, the stresses on current
   congestion control mechanisms raise the question of whether we need
   more fine-grained feedback from routers.  This includes the challenge
   of allowing connections to avoid the delays of slow-start, and to
   rapidly make use of newly-available bandwidth.  On a more general
   level, we don't understand the potential and limitations for best-
   effort traffic over high delay-bandwidth-product paths, given the
   current feedback from routers, or the range of possibilities for more
   explicit feedback from routers.

As more applications have the need to transfer very large files over high delay-bandwidth-product paths, the stresses on current congestion control mechanisms raise the question of whether we need more fine-grained feedback from routers. This includes the challenge of allowing connections to avoid the delays of slow-start, and to rapidly make use of newly-available bandwidth. On a more general level, we don't understand the potential and limitations for best- effort traffic over high delay-bandwidth-product paths, given the current feedback from routers, or the range of possibilities for more explicit feedback from routers.

   There is also a need for long-term research in congestion control
   that is separate from specific functional requirements like the ones
   listed above.  We know very little about congestion control dynamics
   or traffic dynamics of a large, complex network like the global
   Internet, with its heterogeneous and changing traffic mixes, link-
   level technologies, network protocols and router mechanisms, patterns
   of congestion, pricing models, and the like.  Expanding our knowledge
   in this area seems likely to require a rich mix of measurement,
   analysis, simulations, and experimentation.

There is also a need for long-term research in congestion control that is separate from specific functional requirements like the ones listed above. We know very little about congestion control dynamics or traffic dynamics of a large, complex network like the global Internet, with its heterogeneous and changing traffic mixes, link- level technologies, network protocols and router mechanisms, patterns of congestion, pricing models, and the like. Expanding our knowledge in this area seems likely to require a rich mix of measurement, analysis, simulations, and experimentation.

3.8.  Studying the Evolution of the Internet Infrastructure

3.8. Studying the Evolution of the Internet Infrastructure

   The evolution of the Internet infrastructure has been frustratingly
   slow and difficult, with long stories about the difficulties in
   adding IPv6, QoS, multicast, and other functionality to the Internet.
   We need a more scientific understanding of the evolutionary
   potentials and evolutionary difficulties of the Internet
   infrastructure.

The evolution of the Internet infrastructure has been frustratingly slow and difficult, with long stories about the difficulties in adding IPv6, QoS, multicast, and other functionality to the Internet. We need a more scientific understanding of the evolutionary potentials and evolutionary difficulties of the Internet infrastructure.

   This evolutionary potential is affected not only by the technical
   issues of the layered IP architecture, but by other factors as well.
   These factors include the changes in the environment over time (e.g.,
   the recent overprovisioning of backbones, the deployment of
   firewalls), and the role of the standardization process.  Economic
   and public policy factors are also critical, including the central
   fact of the Internet as a decentralized system, with key players
   being not only individuals, but also ISPs, companies, and entire

This evolutionary potential is affected not only by the technical issues of the layered IP architecture, but by other factors as well. These factors include the changes in the environment over time (e.g., the recent overprovisioning of backbones, the deployment of firewalls), and the role of the standardization process. Economic and public policy factors are also critical, including the central fact of the Internet as a decentralized system, with key players being not only individuals, but also ISPs, companies, and entire

Atkinson & Floyd             Informational                     [Page 20]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 20] RFC 3869 Research Funding Recommendations August 2004

   industries.  Deployment issues are also key factors in the evolution
   of the Internet, including the continual chicken-and-egg problem of
   having enough customers to merit rolling out a service whose utility
   depends on the size of the customer base in the first place.

industries. Deployment issues are also key factors in the evolution of the Internet, including the continual chicken-and-egg problem of having enough customers to merit rolling out a service whose utility depends on the size of the customer base in the first place.

   Overlay networks might serve as a transition technology for some new
   functionality, with an initial deployment in overlay networks, and
   with the new functionality moving later into the core if it seems
   warranted.

Overlay networks might serve as a transition technology for some new functionality, with an initial deployment in overlay networks, and with the new functionality moving later into the core if it seems warranted.

   There are also increased obstacles to the evolution of the Internet
   in the form of increased complexity [WD02], unanticipated feature
   interactions [Kruse00], interactions between layers [CWWS92],
   interventions by middleboxes [RFC-3424], and the like.  Because
   increasing complexity appears inevitable, research is needed to
   understand architectural mechanisms that can accommodate increased
   complexity without decreasing robustness of performance in unknown
   environments, and without closing off future possibilities for
   evolution.  More concretely, research is needed on how to evolve the
   Internet will still maintaining its core strengths, such as the
   current degree of global addressability of hosts, end-to-end
   transparency of packet forwarding, and good performance for best-
   effort traffic.

There are also increased obstacles to the evolution of the Internet in the form of increased complexity [WD02], unanticipated feature interactions [Kruse00], interactions between layers [CWWS92], interventions by middleboxes [RFC-3424], and the like. Because increasing complexity appears inevitable, research is needed to understand architectural mechanisms that can accommodate increased complexity without decreasing robustness of performance in unknown environments, and without closing off future possibilities for evolution. More concretely, research is needed on how to evolve the Internet will still maintaining its core strengths, such as the current degree of global addressability of hosts, end-to-end transparency of packet forwarding, and good performance for best- effort traffic.

3.9.  Middleboxes

3.9. Middleboxes

   Research is needed to address the challenges posed by the wide range
   of middleboxes [RFC-3234].  This includes issues of security,
   control, data integrity, and on the general impact of middleboxes on
   the architecture.

Research is needed to address the challenges posed by the wide range of middleboxes [RFC-3234]. This includes issues of security, control, data integrity, and on the general impact of middleboxes on the architecture.

   In many ways middleboxes are a direct outgrowth of commercial
   interests, but there is a need to look beyond the near-term needs for
   the technology, to research its broader implications and to explore
   ways to improve how middleboxes are integrated into the architecture.

In many ways middleboxes are a direct outgrowth of commercial interests, but there is a need to look beyond the near-term needs for the technology, to research its broader implications and to explore ways to improve how middleboxes are integrated into the architecture.

3.10.  Internet Measurement

3.10. Internet Measurement

   A recurring challenge is measuring the Internet; there have been many
   discussions about the need for measurement studies as an integral
   part of Internet research [Claffy03].  In this discussion, we define
   measurement quite broadly.  For example, there are numerous
   challenges in measuring performance along any substantial Internet
   path, particularly when the path crosses administrative domain
   boundaries.  There are also challenges in measuring
   protocol/application usage on any high-speed Internet link.  Many of

A recurring challenge is measuring the Internet; there have been many discussions about the need for measurement studies as an integral part of Internet research [Claffy03]. In this discussion, we define measurement quite broadly. For example, there are numerous challenges in measuring performance along any substantial Internet path, particularly when the path crosses administrative domain boundaries. There are also challenges in measuring protocol/application usage on any high-speed Internet link. Many of

Atkinson & Floyd             Informational                     [Page 21]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 21] RFC 3869 Research Funding Recommendations August 2004

   the problems discussed above would benefit from increased frequency
   of measurement as well as improved quality of measurement on the
   deployed Internet.

the problems discussed above would benefit from increased frequency of measurement as well as improved quality of measurement on the deployed Internet.

   A key issue in network measurement is that most commercial Internet
   Service Providers consider the particular characteristics of their
   production IP network(s) to be trade secrets.  Ways need to be found
   for cooperative measurement studies, e.g., to allow legitimate non-
   commercial researchers to be able to measure relevant network
   parameters while also protecting the privacy rights of the measured
   ISPs.

A key issue in network measurement is that most commercial Internet Service Providers consider the particular characteristics of their production IP network(s) to be trade secrets. Ways need to be found for cooperative measurement studies, e.g., to allow legitimate non- commercial researchers to be able to measure relevant network parameters while also protecting the privacy rights of the measured ISPs.

   Absent measured data, there is possibly an over-reliance on network
   simulations in some parts of the Internet research community and
   probably insufficient validation that existing network simulation
   models are reasonably good representations of the deployed Internet
   (or of some plausible future Internet) [FK02].

Absent measured data, there is possibly an over-reliance on network simulations in some parts of the Internet research community and probably insufficient validation that existing network simulation models are reasonably good representations of the deployed Internet (or of some plausible future Internet) [FK02].

   Without solid measurement of the current Internet behavior, it is
   very difficult to know what otherwise unknown operational problems
   exist that require attention, and it is equally difficult to fully
   understand the impact of changes (past or future) upon the Internet's
   actual behavioral characteristics.

Without solid measurement of the current Internet behavior, it is very difficult to know what otherwise unknown operational problems exist that require attention, and it is equally difficult to fully understand the impact of changes (past or future) upon the Internet's actual behavioral characteristics.

3.11.  Applications

3.11. Applications

   Research is needed on a wide range of issues related to Internet
   applications.

Research is needed on a wide range of issues related to Internet applications.

   Taking email as one example application, research is needed on
   understanding the spam problem, and on investigating tools and
   techniques to mitigate the effects of spam, including tools and
   techniques that aid the implementation of legal and other non-
   technical anti-spam measures [ASRG].  "Spam" is a generic term for a
   range of significantly different types of unwanted bulk email, with
   many types of senders, content and traffic-generating techniques.  As
   one part of controlling spam, we need to develop a much better
   understanding of its many, different characteristics and their
   interactions with each other.

Taking email as one example application, research is needed on understanding the spam problem, and on investigating tools and techniques to mitigate the effects of spam, including tools and techniques that aid the implementation of legal and other non- technical anti-spam measures [ASRG]. "Spam" is a generic term for a range of significantly different types of unwanted bulk email, with many types of senders, content and traffic-generating techniques. As one part of controlling spam, we need to develop a much better understanding of its many, different characteristics and their interactions with each other.

3.12.  Meeting the Needs of the Future

3.12. Meeting the Needs of the Future

   As network size, link bandwidth, CPU capacity, and the number of
   users all increase, research will be needed to ensure that the
   Internet of the future scales to meet these increasing demands.  We
   have discussed some of these scaling issues in specific sections
   above.

As network size, link bandwidth, CPU capacity, and the number of users all increase, research will be needed to ensure that the Internet of the future scales to meet these increasing demands. We have discussed some of these scaling issues in specific sections above.

Atkinson & Floyd             Informational                     [Page 22]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 22] RFC 3869 Research Funding Recommendations August 2004

   However, for all of the research questions discussed in this
   document, the goal of the research must be not only to meet the
   challenges already experienced today, but also to meet the challenges
   that can be expected to emerge in the future.

However, for all of the research questions discussed in this document, the goal of the research must be not only to meet the challenges already experienced today, but also to meet the challenges that can be expected to emerge in the future.

3.13.  Freely Distributable Prototypes

3.13. Freely Distributable Prototypes

   U.S.'s DARPA has historically funded development of freely
   distributable implementations of various Internet technologies (e.g.,
   TCP/IPv4, RSVP, IPv6, and IP security) in a variety of operating
   systems (e.g., 4.2 BSD, 4.3 BSD, 4.4 BSD, Tenex).  Experience has
   shown that a good way to speed deployment of a new technology is to
   provide an unencumbered, freely-distributable prototype that can be
   incorporated into commercial products as well as non-commercial
   prototypes.  Japan's WIDE Project has also funded some such work,
   primarily focused on IPv6 implementation for 4.4 BSD and Linux.
   [WIDE] We believe that applied research projects in networking will
   have an increased probability of success if the research project
   teams make their resulting software implementations freely available
   for both commercial and non-commercial uses.  Examples of successes
   here include the DARPA funding of TCP/IPv4 integration into the 4.x
   BSD operating system [MBKQ96], DARPA/USN funding of ESP/AH design and
   integration into 4.4 BSD [Atk96], as well as separate DARPA/USN and
   WIDE funding of freely distributable IPv6 prototypes [Atk96, WIDE].

U.S.'s DARPA has historically funded development of freely distributable implementations of various Internet technologies (e.g., TCP/IPv4, RSVP, IPv6, and IP security) in a variety of operating systems (e.g., 4.2 BSD, 4.3 BSD, 4.4 BSD, Tenex). Experience has shown that a good way to speed deployment of a new technology is to provide an unencumbered, freely-distributable prototype that can be incorporated into commercial products as well as non-commercial prototypes. Japan's WIDE Project has also funded some such work, primarily focused on IPv6 implementation for 4.4 BSD and Linux. [WIDE] We believe that applied research projects in networking will have an increased probability of success if the research project teams make their resulting software implementations freely available for both commercial and non-commercial uses. Examples of successes here include the DARPA funding of TCP/IPv4 integration into the 4.x BSD operating system [MBKQ96], DARPA/USN funding of ESP/AH design and integration into 4.4 BSD [Atk96], as well as separate DARPA/USN and WIDE funding of freely distributable IPv6 prototypes [Atk96, WIDE].

4.  Conclusions

4. Conclusions

   This document has summarized the history of research funding for the
   Internet and highlighted examples of open research questions.  The
   IAB believes that more research is required to further the evolution
   of the Internet infrastructure, and that consistent, sufficient non-
   commercial funding is needed to enable such research.

This document has summarized the history of research funding for the Internet and highlighted examples of open research questions. The IAB believes that more research is required to further the evolution of the Internet infrastructure, and that consistent, sufficient non- commercial funding is needed to enable such research.

   In case there is any confusion, in this document we are not
   suggesting any direct or indirect role for the IAB, the IETF, or the
   IRTF in handling any funding for Internet research.

In case there is any confusion, in this document we are not suggesting any direct or indirect role for the IAB, the IETF, or the IRTF in handling any funding for Internet research.

5.  Acknowledgements

5. Acknowledgements

   The people who directly contributed to this document in some form
   include the following: Ran Atkinson, Guy Almes, Rob Austein, Vint
   Cerf, Jon Crowcroft, Sally Floyd, James Kempf, Joe Macker, Craig
   Partridge, Vern Paxson, Juergen Schoenwaelder, and Mike St. Johns.

The people who directly contributed to this document in some form include the following: Ran Atkinson, Guy Almes, Rob Austein, Vint Cerf, Jon Crowcroft, Sally Floyd, James Kempf, Joe Macker, Craig Partridge, Vern Paxson, Juergen Schoenwaelder, and Mike St. Johns.

   We are also grateful to Kim Claffy, Dave Crocker, Michael Eder, Eric
   Fleischman, Andrei Gurtov, Stephen Kent, J.P. Martin-Flatin, and
   Hilarie Orman for feedback on earlier drafts of this document.

We are also grateful to Kim Claffy, Dave Crocker, Michael Eder, Eric Fleischman, Andrei Gurtov, Stephen Kent, J.P. Martin-Flatin, and Hilarie Orman for feedback on earlier drafts of this document.

Atkinson & Floyd             Informational                     [Page 23]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 23] RFC 3869 Research Funding Recommendations August 2004

   We have also drawn from the following reports:
   [CIPB02,IST02,NV02,NSF02,NSF03,NSF03a].

We have also drawn from the following reports: [CIPB02,IST02,NV02,NSF02,NSF03,NSF03a].

6.  Security Considerations

6. Security Considerations

   This document does not itself create any new security issues for the
   Internet community.  Security issues within the Internet Architecture
   primarily are discussed in Section 3.4 above.

This document does not itself create any new security issues for the Internet community. Security issues within the Internet Architecture primarily are discussed in Section 3.4 above.

7.  Informative References

7. Informative References

   [ASRG]        Anti-Spam Research Group (ASRG) of the IRTF.  URL
                 "http://asrg.sp.am/".

[ASRG] Anti-Spam Research Group (ASRG) of the IRTF. URL "http://asrg.sp.am/".

   [Atk96]       R. Atkinson et al., "Implementation of IPv6 in 4.4
                 BSD", Proceedings of USENIX 1996 Annual Technical
                 Conference, USENIX Association, Berkeley, CA, USA.
                 January 1996.  URL
                 http://www.chacs.itd.nrl.navy.mil/publications/CHACS/
                 1996/1996atkinson-USENIX.pdf

[Atk96] R. Atkinson et al., "Implementation of IPv6 in 4.4 BSD", Proceedings of USENIX 1996 Annual Technical Conference, USENIX Association, Berkeley, CA, USA. January 1996. URL http://www.chacs.itd.nrl.navy.mil/publications/CHACS/ 1996/1996atkinson-USENIX.pdf

   [Bellman1957] R.E. Bellman, "Dynamic Programming", Princeton
                 University Press, Princeton, NJ, 1957.

[Bellman1957] R.E. Bellman, "Dynamic Programming", Princeton University Press, Princeton, NJ, 1957.

   [Claffy03]    K. Claffy, "Priorities and Challenges in Internet
                 Measurement, Simulation, and Analysis", Large Scale
                 Network meeting, (US) National Science Foundation,
                 Arlington, VA, USA.  10 June 2003.  URL
                 "http://www.caida.org/outreach/
                 presentations/2003/lsn20030610/".

[Claffy03] K. Claffy, "Priorities and Challenges in Internet Measurement, Simulation, and Analysis", Large Scale Network meeting, (US) National Science Foundation, Arlington, VA, USA. 10 June 2003. URL "http://www.caida.org/outreach/ presentations/2003/lsn20030610/".

   [Claffy03a]   K. Claffy, "Top Problems of the Internet and What
                 Sysadmins and Researchers Can Do To Help", plenary talk
                 at LISA'03, October 2003.  URL
                 "http://www.caida.org/outreach/presentations/
                 2003/netproblems_lisa03/".

[Claffy03a] K. Claffy, "Top Problems of the Internet and What Sysadmins and Researchers Can Do To Help", plenary talk at LISA'03, October 2003. URL "http://www.caida.org/outreach/presentations/ 2003/netproblems_lisa03/".

   [Clark02]     D. D. Clark, "Deploying the Internet - why does it take
                 so long and, can research help?", Large-Scale
                 Networking Distinguished Lecture Series, (U.S.)
                 National Science Foundation, Arlington, VA, 8 January
                 2002.  URL: http://www.ngi-
                 supernet.org/conferences.html

[Clark02] D. D. Clark, "Deploying the Internet - why does it take so long and, can research help?", Large-Scale Networking Distinguished Lecture Series, (U.S.) National Science Foundation, Arlington, VA, 8 January 2002. URL: http://www.ngi- supernet.org/conferences.html

Atkinson & Floyd             Informational                     [Page 24]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 24] RFC 3869 Research Funding Recommendations August 2004

   [CSTB99]      Computer Science and Telecommunications Board, (U.S.)
                 National Research Council, "Funding a Revolution:
                 Government Support for Computing Research", National
                 Academy Press, Washington, DC, 1999.  URL
                 "http://www7.nationalacademies.org/cstb/
                 pub_revolution.html".

[CSTB99] Computer Science and Telecommunications Board, (U.S.) National Research Council, "Funding a Revolution: Government Support for Computing Research", National Academy Press, Washington, DC, 1999. URL "http://www7.nationalacademies.org/cstb/ pub_revolution.html".

   [CIPB02]      Critical Infrastructure Protection Board, "National
                 Strategy to Secure Cyberspace", The White House,
                 Washington, DC, USA.  September 2002, URL
                 "http://www.whitehouse.gov/pcipb".

[CIPB02] Critical Infrastructure Protection Board, "National Strategy to Secure Cyberspace", The White House, Washington, DC, USA. September 2002, URL "http://www.whitehouse.gov/pcipb".

   [CWWS92]      J. Crowcroft, I. Wakeman, Z. Wang, and D. Sirovica, "Is
                 Layering Harmful?", IEEE Networks, Vol. 6, Issue 1, pp
                 20-24, January 1992.

[CWWS92] J. Crowcroft, I. Wakeman, Z. Wang, and D. Sirovica, "Is Layering Harmful?", IEEE Networks, Vol. 6, Issue 1, pp 20-24, January 1992.

   [Diot00]      C. Diot, et al., "Deployment Issues for the IP
                 Multicast Service and Architecture", IEEE Network,
                 January/February 2000.

[Diot00] C. Diot, et al., "Deployment Issues for the IP Multicast Service and Architecture", IEEE Network, January/February 2000.

   [Deering1988] S. Deering, "Multicast Routing in Internetworks and
                 LANs", ACM Computer Communications Review, Volume 18,
                 Issue 4, August 1988.

[Deering1988] S. Deering, "Multicast Routing in Internetworks and LANs", ACM Computer Communications Review, Volume 18, Issue 4, August 1988.

   [Dijkstra59]  E. Dijkstra, "A Note on Two Problems in Connexion with
                 Graphs", Numerische Mathematik, 1, 1959, pp.269-271.

[Dijkstra59] E. Dijkstra, "A Note on Two Problems in Connexion with Graphs", Numerische Mathematik, 1, 1959, pp.269-271.

   [FF1962]      L. R. Ford Jr. and D.R. Fulkerson, "Flows in Networks",
                 Princeton University Press, Princeton, NJ, 1962.

[FF1962] L. R. Ford Jr. and D.R. Fulkerson, "Flows in Networks", Princeton University Press, Princeton, NJ, 1962.

   [FK02]        S. Floyd and E. Kohler, "Internet Research Needs Better
                 Models", Proceedings of 1st Workshop on Hot Topics in
                 Networks (Hotnets-I),  Princeton, NJ, USA. October
                 2002.  URL
                 "http://www.icir.org/models/bettermodels.html".

[FK02] S. Floyd and E. Kohler, "Internet Research Needs Better Models", Proceedings of 1st Workshop on Hot Topics in Networks (Hotnets-I), Princeton, NJ, USA. October 2002. URL "http://www.icir.org/models/bettermodels.html".

   [IM1993]      J. Ioannidis and G. Maguire Jr., "The Design and
                 Implementation of a Mobile Internetworking
                 Architecture", Proceedings of the Winter USENIX
                 Technical Conference, pages 489-500, Berkeley, CA, USA,
                 January 1993.

[IM1993] J. Ioannidis and G. Maguire Jr., "The Design and Implementation of a Mobile Internetworking Architecture", Proceedings of the Winter USENIX Technical Conference, pages 489-500, Berkeley, CA, USA, January 1993.

   [IST02]       Research Networking in Europe - Striving for Global
                 Leadership, Information Society Technologies, 2002.
                 URL "http://www.cordis.lu/ist/rn/rn-brochure.htm".

[IST02] Research Networking in Europe - Striving for Global Leadership, Information Society Technologies, 2002. URL "http://www.cordis.lu/ist/rn/rn-brochure.htm".

Atkinson & Floyd             Informational                     [Page 25]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 25] RFC 3869 Research Funding Recommendations August 2004

   [Jacobson88]  Van Jacobson, "Congestion Avoidance and Control",
                 Proceedings of ACM SIGCOMM 1988 Symposium, ACM SIGCOMM,
                 Stanford, CA, August 1988.  URL
                 "http://citeseer.nj.nec.com/jacobson88congestion.html".

[Jacobson88] Van Jacobson, "Congestion Avoidance and Control", Proceedings of ACM SIGCOMM 1988 Symposium, ACM SIGCOMM, Stanford, CA, August 1988. URL "http://citeseer.nj.nec.com/jacobson88congestion.html".

   [Jackson02]   William Jackson, "U.S. should fund R&D for secure
                 Internet protocols, Clarke says", Government Computer
                 News, 31 October 2002.  URL
                 "http://www.gcn.com/vol1_no1/security/20382-1.html".

[Jackson02] William Jackson, "U.S. should fund R&D for secure Internet protocols, Clarke says", Government Computer News, 31 October 2002. URL "http://www.gcn.com/vol1_no1/security/20382-1.html".

   [Kruse00]     Hans Kruse, "The Pitfalls of Distributed Protocol
                 Development: Unintentional Interactions between Network
                 Operations and Applications Protocols", Proceedings of
                 the 8th International Conference on Telecommunication
                 Systems Design, Nashville, TN, USA, March 2000.  URL
                 "http://www.csm.ohiou.edu/kruse/publications/
                 TSYS2000.pdf".

[Kruse00] Hans Kruse, "The Pitfalls of Distributed Protocol Development: Unintentional Interactions between Network Operations and Applications Protocols", Proceedings of the 8th International Conference on Telecommunication Systems Design, Nashville, TN, USA, March 2000. URL "http://www.csm.ohiou.edu/kruse/publications/ TSYS2000.pdf".

   [KLMS2000]    S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure
                 Border Gateway Protocol (S-BGP)", Proceedings of ISOC
                 Network and Distributed Systems Security Symposium,
                 Internet Society, Reston, VA, February 2000.

[KLMS2000] S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure Border Gateway Protocol (S-BGP)", Proceedings of ISOC Network and Distributed Systems Security Symposium, Internet Society, Reston, VA, February 2000.

   [LD2002]      E. Lear and R. Droms, "What's in a Name: Thoughts from
                 the NSRG", expired Internet-Draft, December 2002.

[LD2002] E. Lear and R. Droms, "What's in a Name: Thoughts from the NSRG", expired Internet-Draft, December 2002.

   [MBFIPS01]    Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John
                 Ioannidis, Vern Paxson, and Scott Shenker, "Controlling
                 High Bandwidth Aggregates in the Network", ACM Computer
                 Communications Review, Vol. 32, No. 3, July 2002.  URL
                 "http://www.icir.org/pushback/".

[MBFIPS01] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker, "Controlling High Bandwidth Aggregates in the Network", ACM Computer Communications Review, Vol. 32, No. 3, July 2002. URL "http://www.icir.org/pushback/".

   [MBKQ96]      M. McKusick, K. Bostic, M. Karels, and J. Quarterman,
                 "Design and Implementation of the 4.4 BSD Operating
                 System", Addison-Wesley, Reading, MA, 1996.

[MBKQ96] M. McKusick, K. Bostic, M. Karels, and J. Quarterman, "Design and Implementation of the 4.4 BSD Operating System", Addison-Wesley, Reading, MA, 1996.

   [MGVK02]      Z. Mao, R. Govindan, G. Varghese, & R. Katz, "Route
                 Flap Dampening Exacerbates Internet Routing
                 Convergence", Proceedings of ACM SIGCOMM 2002, ACM,
                 Pittsburgh, PA, USA, August 2002.

[MGVK02] Z. Mao, R. Govindan, G. Varghese, & R. Katz, "Route Flap Dampening Exacerbates Internet Routing Convergence", Proceedings of ACM SIGCOMM 2002, ACM, Pittsburgh, PA, USA, August 2002.

   [NV02]        NetVision 2012 Committee,"DARPA's Ten-Year Strategic
                 Plan for Networking Research", (U.S.) Defense Advanced
                 Research Projects Agency, October 2002.  Citation for
                 acknowledgement purposes only.

[NV02] NetVision 2012 Committee,"DARPA's Ten-Year Strategic Plan for Networking Research", (U.S.) Defense Advanced Research Projects Agency, October 2002. Citation for acknowledgement purposes only.

Atkinson & Floyd             Informational                     [Page 26]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 26] RFC 3869 Research Funding Recommendations August 2004

   [NSF02]       NSF Workshop on Network Research Testbeds, National
                 Science Foundation, Directorate for Computer and
                 Information Science & Engineering, Advanced Networking
                 Infrastructure & Research Division, Arlington, VA, USA,
                 October 2002.  URL "http://www-
                 net.cs.umass.edu/testbed_workshop/".

[NSF02] NSF Workshop on Network Research Testbeds, National Science Foundation, Directorate for Computer and Information Science & Engineering, Advanced Networking Infrastructure & Research Division, Arlington, VA, USA, October 2002. URL "http://www- net.cs.umass.edu/testbed_workshop/".

   [NSF03]       NSF ANIR Principal Investigator meeting, National
                 Science Foundation, Arlington, VA, USA.  January 9-10,
                 2003, URL "http://www.ncne.org/training/nsf-
                 pi/2003/nsfpimain.html".

[NSF03] NSF ANIR Principal Investigator meeting, National Science Foundation, Arlington, VA, USA. January 9-10, 2003, URL "http://www.ncne.org/training/nsf- pi/2003/nsfpimain.html".

   [NSF03a]      D. E. Atkins, et al., "Revolutionizing Science and
                 Engineering Through Cyberinfrastructure", Report of NSF
                 Advisory Panel on Cyberinfrastructure, January 2003.
                 URL "http://www.cise.nsf.gov/evnt/reports/
                 atkins_annc_020303.htm".

[NSF03a] D. E. Atkins, et al., "Revolutionizing Science and Engineering Through Cyberinfrastructure", Report of NSF Advisory Panel on Cyberinfrastructure, January 2003. URL "http://www.cise.nsf.gov/evnt/reports/ atkins_annc_020303.htm".

   [NSF03b]      Report of the National Science Foundation Workshop on
                 Fundamental Research in Networking.  April 24-25, 2003.
                 URL "http://www.cs.virginia.edu/~jorg/workshop1/NSF-
                 NetWorkshop-2003.pdf".

[NSF03b] Report of the National Science Foundation Workshop on Fundamental Research in Networking. April 24-25, 2003. URL "http://www.cs.virginia.edu/~jorg/workshop1/NSF- NetWorkshop-2003.pdf".

   [Floyd]       S. Floyd, "Papers about Research Questions for the
                 Internet", web page, ICSI Center for Internet Research
                 (ICIR), Berkeley, CA, 2003 URL
                 "http://www.icir.org/floyd/research_questions.html".

[Floyd] S. Floyd, "Papers about Research Questions for the Internet", web page, ICSI Center for Internet Research (ICIR), Berkeley, CA, 2003 URL "http://www.icir.org/floyd/research_questions.html".

   [RFC-1510]    Kohl, J. and C. Neuman, "The Kerberos Network
                 Authentication Service (V5)", RFC 1510, September 1993.

[RFC-1510] Kohl, J. and C. Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510, September 1993.

   [RFC-1633]    Braden, R., Clark, D., and S. Shenker, "Integrated
                 Services in the Internet Architecture: an Overview",
                 RFC 1633, June 1994.

[RFC-1633] Braden, R., Clark, D., and S. Shenker, "Integrated Services in the Internet Architecture: an Overview", RFC 1633, June 1994.

   [RFC-2082]    Baker, F. and R. Atkinson, "RIP-2 MD5 Authentication",
                 RFC 2082, January 1997.

[RFC-2082] Baker, F. and R. Atkinson, "RIP-2 MD5 Authentication", RFC 2082, January 1997.

   [RFC-2210]    Wroclawski, J., "The Use of RSVP with IETF Integrated
                 Services", RFC 2210, September 1997.

[RFC-2210] Wroclawski, J., "The Use of RSVP with IETF Integrated Services", RFC 2210, September 1997.

   [RFC-2154]    Murphy, S., Badger, M., and B. Wellington, "OSPF with
                 Digital Signatures", RFC 2154, June 1997.

[RFC-2154] Murphy, S., Badger, M., and B. Wellington, "OSPF with Digital Signatures", RFC 2154, June 1997.

   [RFC-2385]    Heffernan, A., "Protection of BGP Sessions via the TCP
                 MD5 Signature Option", RFC 2385, August 1998.

[RFC-2385] Heffernan, A., "Protection of BGP Sessions via the TCP MD5 Signature Option", RFC 2385, August 1998.

Atkinson & Floyd             Informational                     [Page 27]

RFC 3869            Research Funding Recommendations         August 2004

Atkinson & Floyd Informational [Page 27] RFC 3869 Research Funding Recommendations August 2004

   [RFC-2407]    Piper, D., "The Internet IP Security Domain of
                 Interpretation for ISAKMP", RFC 2407, November 1998.

[RFC-2407] Piper, D., "The Internet IP Security Domain of Interpretation for ISAKMP", RFC 2407, November 1998.

   [RFC-2501]    Corson, S. and J. Macker, "Mobile Ad hoc Networking
                 (MANET): Routing Protocol Performance Issues and
                 Evaluation Considerations", RFC 2501, January 1999.

[RFC-2501] Corson, S. and J. Macker, "Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations", RFC 2501, January 1999.

   [RFC-2990]    Huston, G., "Next Steps for the IP QoS Architecture",
                 RFC 2990, November 2000.

[RFC-2990] Huston, G., "Next Steps for the IP QoS Architecture", RFC 2990, November 2000.

   [RFC-3221]    Huston, G., "Commentary on Inter-Domain Routing in the
                 Internet", RFC 3221, December 2001.

[RFC-3221] Huston, G., "Commentary on Inter-Domain Routing in the Internet", RFC 3221, December 2001.

   [RFC-3234]    Carpenter, B. and S. Brim, "Middleboxes: Taxonomy and
                 Issues", RFC 3234, February 2002.

[RFC-3234] Carpenter, B. and S. Brim, "Middleboxes: Taxonomy and Issues", RFC 3234, February 2002.

   [RFC-3424]    Daigle, L. and IAB, "IAB Considerations for UNilateral
                 Self-Address Fixing (UNSAF) Across Network Address
                 Translation", RFC 3424, November 2002.

[RFC-3424] Daigle, L. and IAB, "IAB Considerations for UNilateral Self-Address Fixing (UNSAF) Across Network Address Translation", RFC 3424, November 2002.

   [RFC-3467]    Klensin, J., "Role of the Domain Name System (DNS)",
                 RFC 3467, February 2003.

[RFC-3467] Klensin, J., "Role of the Domain Name System (DNS)", RFC 3467, February 2003.

   [RFC-3535]    Schoenwaelder, J., "Overview of the 2002 IAB Network
                 Management Workshop", RFC 3535, May 2003.

[RFC-3535] Schoenwaelder, J., "Overview of the 2002 IAB Network Management Workshop", RFC 3535, May 2003.

   [RFC-3387]    Eder, M., Chaskar, H., and S. Nag, "Considerations from
                 the Service Management Research Group (SMRG) on Quality
                 of Service (QoS) in the IP Network", RFC 3387,
                 September 2002.

[RFC-3387] 「IPネットワークにおけるサービスの質(QoS)に関するサービス管理研究グループ(SMRG)からの問題」と、エーダー、M.、Chaskar、H.、およびS.は口喧しく言います、RFC3387、2002年9月。

   [RIPE]        RIPE (Reseaux IP Europeens), Amsterdam, NL.  URL
                 "http://www.ripe.net/ripe/".

[熟す]の熟している(Reseaux IP Europeens)、アムステルダムNL。 URL" http://www.ripe.net/ripe/ "。

   [Savage00]    Savage, S., Wetherall, D., Karlink, A. R., and
                 Anderson, T., "Practical Network Support for IP
                 Traceback", Proceedings of 2000 ACM SIGCOMM Conference,
                 ACM SIGCOMM, Stockholm, SE, pp. 295-306.  August 2000.

2000年のACM SIGCOMMコンファレンスの[Savage00]サヴェージとS.とWetherallとD.とKarlink、A.R.とアンダーソン、T.、「IP Tracebackの実用的なネットワークサポート」Proceedings、ACM SIGCOMM、ストックホルムSE、ページ 295-306. 2000年8月。

   [Schiller03]  J. I. Schiller, "Interception Technology: The Good, The
                 Bad, and The Ugly!", Presentation at 28th NANOG
                 Meeting, North American Network Operators Group
                 (NANOG), Ann Arbor, MI, USA, June 2003.  URL
                 "http://www.nanog.org/mtg-0306/schiller.html".

[Schiller03]J.I.シラー、「妨害技術:」 「良く、悪くおよび醜さ!」、第28NANOGミーティングにおけるプレゼンテーション、(NANOG)、ネットワーク・オペレータグループアナーバー(MI)(米国)2003年6月に、北米です。 URL" http://www.nanog.org/mtg-0306/schiller.html "。

Atkinson & Floyd             Informational                     [Page 28]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[28ページ]のRFC3869Research

   [SM03]        P. Sharma and R. Malpani, "IP Multicast Operational
                 Network Management: Design, Challenges, and
                 Experiences", IEEE Network, Vol.  17, No. 2, March
                 2003.

[SM03] P.シャルマとR.Malpani、「IPのマルチキャストの操作上のネットワークマネージメント:」 IEEEは、Vol.17、2003年3月No.日2に「デザイン、挑戦、および経験」とネットワークでつなぎます。

   [SMA03]       N. Spring, R. Mahajan, & T. Anderson, "Quantifying the
                 Causes of Path Inflation", Proceedings of ACM SIGCOMM
                 2003, ACM, Karlsruhe, Germany, August 2003.

[SMA03]N.スプリング、R.高利貸し、およびT.アンダーソン、「経路インフレーションの原因を定量化します」、ACM SIGCOMM2003(ACM、カールスルーエ(ドイツ)2003年8月)の議事。

   [WD02]        Walter Willinger and John Doyle, "Robustness and the
                 Internet:  Design and Evolution", Unpublished/Preprint,
                 1 March 2002, URL
                 "http://netlab.caltech.edu/internet/".

[WD02] ウォルター・ウィリンジャーとジョン・ドイル、「丈夫さとインターネット:」 「デザインと発展」、/前印刷、2002年3月1日、未発表のURL" http://netlab.caltech.edu/internet/ "。

   [WIDE]        WIDE Project, Japan.  URL "http://www.wide.ad.jp/".

[広い] 広いプロジェクト、日本。 URL" http://www.wide.ad.jp/ "。

8.  Authors' Addresses

8. 作者のアドレス

   Internet Architecture Board
   EMail:  iab@iab.org

インターネット・アーキテクチャ委員会メール: iab@iab.org

   Internet Architecture Board Members
   at the time this document was published were:

このドキュメントが発表されたとき、インターネット・アーキテクチャ委員会のメンバーは以下の通りでした。

   Bernard Aboba
   Harald Alvestrand (IETF chair)
   Rob Austein
   Leslie Daigle (IAB chair)
   Patrik Faltstrom
   Sally Floyd
   Mark Handley
   Bob Hinden
   Geoff Huston (IAB Executive Director)
   Jun-ichiro Itojun Hagino
   Eric Rescorla
   Pete Resnick
   Jonathan Rosenberg

バーナード・Abobaハラルド・Alvestrand(IETFいす)ロブAusteinレスリーDaigle(IABいす)パトリク・Faltstromサリー・フロイド・マーク・ハンドレー・ボブ・Hindenジェフ・ヒューストン(IAB事務局長)6月-ichiro Itojun Haginoエリック・レスコラ・ピートレズニック・ジョナサン・ローゼンバーグ

   We note that Ran Atkinson, one of the editors of the document, was an
   IAB member at the time that this document was first created, in
   November 2002, and that Vern Paxson, the IRTF chair, is an ex-officio
   member of the IAB.

私たちは、ドキュメントのエディタのひとり歳のRanアトキンソンがこのドキュメントが2002年11月に最初に、作成されて、バーン・パクソン(IRTFいす)がIABの職権上の会員である時間のIABメンバーであったことに注意します。

Atkinson & Floyd             Informational                     [Page 29]

RFC 3869            Research Funding Recommendations         August 2004

2004年8月に推薦に資金を供給するアトキンソンとフロイド情報[29ページ]のRFC3869Research

Full Copyright Statement

完全な著作権宣言文

   Copyright (C) The Internet Society (2004).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.

Copyright(C)インターネット協会(2004)。 このドキュメントはBCP78に含まれた権利、ライセンス、および制限を受けることがあります、そして、そこに詳しく説明されるのを除いて、作者は彼らのすべての権利を保有します。

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/S HE
   REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
   INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
   IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

彼が代理をするか、または(もしあれば)後援される/S、インターネット協会とインターネット・エンジニアリング・タスク・フォースはすべての保証を放棄して、急行か暗示していて、含んでいる他はあらゆる保証です。「そのままで」という基礎と貢献者の上でこのドキュメントとここに含まれた情報を提供して、組織が彼である、情報の使用はここにどんな権利か市場性のどんな黙示的な保証か特定目的への適合性も侵害しないでしょう。

Intellectual Property

知的所有権

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the IETF's procedures with respect to rights in IETF Documents can
   be found in BCP 78 and BCP 79.

IETFはどんなIntellectual Property Rightsの正当性か範囲、実現に関係すると主張されるかもしれない他の権利、本書では説明された技術の使用またはそのような権利の下におけるどんなライセンスも利用可能であるかもしれない、または利用可能でないかもしれない範囲に関しても立場を全く取りません。 または、それはそれを表しません。どんなそのような権利も特定するためのどんな独立している努力もしました。 BCP78とBCP79でIETF Documentsの権利に関するIETFの手順に関する情報を見つけることができます。

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

IPR公開のコピーが利用可能に作られるべきライセンスの保証、または一般的な免許を取得するのが作られた試みの結果をIETF事務局といずれにもしたか、または http://www.ietf.org/ipr のIETFのオンラインIPR倉庫からこの仕様のimplementersかユーザによるそのような所有権の使用のために許可を得ることができます。

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

IETFはこの規格を実行するのに必要であるかもしれない技術をカバーするかもしれないどんな著作権もその注目していただくどんな利害関係者、特許、特許出願、または他の所有権も招待します。 ietf ipr@ietf.org のIETFに情報を記述してください。

Acknowledgement

承認

   Funding for the RFC Editor function is currently provided by the
   Internet Society.

RFC Editor機能のための基金は現在、インターネット協会によって提供されます。

Atkinson & Floyd             Informational                     [Page 30]

アトキンソンとフロイドInformationalです。[30ページ]

一覧

 RFC 1〜100  RFC 1401〜1500  RFC 2801〜2900  RFC 4201〜4300 
 RFC 101〜200  RFC 1501〜1600  RFC 2901〜3000  RFC 4301〜4400 
 RFC 201〜300  RFC 1601〜1700  RFC 3001〜3100  RFC 4401〜4500 
 RFC 301〜400  RFC 1701〜1800  RFC 3101〜3200  RFC 4501〜4600 
 RFC 401〜500  RFC 1801〜1900  RFC 3201〜3300  RFC 4601〜4700 
 RFC 501〜600  RFC 1901〜2000  RFC 3301〜3400  RFC 4701〜4800 
 RFC 601〜700  RFC 2001〜2100  RFC 3401〜3500  RFC 4801〜4900 
 RFC 701〜800  RFC 2101〜2200  RFC 3501〜3600  RFC 4901〜5000 
 RFC 801〜900  RFC 2201〜2300  RFC 3601〜3700  RFC 5001〜5100 
 RFC 901〜1000  RFC 2301〜2400  RFC 3701〜3800  RFC 5101〜5200 
 RFC 1001〜1100  RFC 2401〜2500  RFC 3801〜3900  RFC 5201〜5300 
 RFC 1101〜1200  RFC 2501〜2600  RFC 3901〜4000  RFC 5301〜5400 
 RFC 1201〜1300  RFC 2601〜2700  RFC 4001〜4100  RFC 5401〜5500 
 RFC 1301〜1400  RFC 2701〜2800  RFC 4101〜4200 

スポンサーリンク

SELECT INTO SELECT命令からテーブルを作成する

ホームページ製作・web系アプリ系の製作案件募集中です。

上に戻る